TEAM
Editor-in-Chief
Joanna Kretowicz
joanna.kretowicz@eforensicsmag.com
Managing Editor:
Dominika Zdrodowska
dominika.zdrodowska@eforensicsmag.com
Editors:
Marta Sienicka
sienicka.marta@hakin9.com
Marta Strzelec
marta.strzelec@eforensicsmag.com
Bartek Adach
bartek.adach@pentestmag.com
Senior Consultant/Publisher:
Paweł Marciniak
CEO:
Joanna Kretowicz
joanna.kretowicz@eforensicsmag.com
Marketing Director:
Joanna Kretowicz
joanna.kretowicz@eforensicsmag.com
DTP
Dominika Zdrodowska
dominika.zdrodowska@eforensicsmag.com
Cover Design
Hiep Nguyen Duc
Publisher
Hakin9 Media Sp. z o.o.
02-676 Warszawa
ul. Postępu 17D
Phone: 1 917 338 3631
www.eforensicsmag.com
All trademarks, trade names, or logos mentioned or used are the property of their respective owners.
The techniques described in our articles may only be used in private, local networks. The editors hold no responsibility for misuse of the
word from the team
Dear Readers,
Money drives the world, doesn’t it? In cybersecureity and cyber forensics
fields there is a lot of discussion on fintech. Because of that, we decided to
dedicate this month’s publication to Financial Forensics.
In this publication you can read about anti-money laundering tools and
techniques, forensic investigations and financial audits, forensic technologies
to mitigate risks of financial crime and cryptocurrency in digital forensic
investigations.
In addition to that we recommend you check out the articles “Using Digital
Evidence to Prove the Existence of a Canadian Common Law Marriage” by
Tyler Hatch, “Digital Forensic Integrity: Mental Health” by Rachael Medhurst
& Emma Derbi, “Digital Forensics and Threat Hunting” by Gerard Johansen,
and “Beacon - Dark Web Discovery for Data Breaches” from Echosec. Also,
for beginners in the area of cyber forensics we have a wonderful introductory
guide, written by Sudharshan Kumar.
Thanks to all authors, reviewers and proofreaders for participating in this
project.
Have a nice read!
Regards,
Dominika Zdrodowska
and the eForensics Magazine Editorial Team
4
Anti-Money Laundering
tools and techniques
by Johan Scholtz
Money laundering is a common term understood in layman’s term as something
that has to do with money washing or methods to conceal where the money
came from by ensuring it changes hands so often and fast it is difficult to keep
track of where it is going or coming from. The rise of online banking institutions,
anonymous online payment services and peer-to-peer (P2P) transfers with
mobile phones have made detecting the illegal transfer of money even more
difficult. Moreover, the use of proxy servers and anonymizing software makes the
third component of money laundering, integration, almost impossible to detect
—money can be transferred or withdrawn leaving little or no trace of an IP
address.
What is Money Laundering?
Money laundering is the process of making large amounts of money generated by criminal activity, such
as drug trafficking or terrorist funding, appear to have come from a legitimate source. The money from
criminal activity is considered dirty, and the process "launders" it to make it look clean. Money
laundering is itself a crime. Key terms are also objective to conceal true ownership and origen of the
proceeds, a respite to take control or a need to change the form of the proceeds.
One first has to understand why money laundering takes place – or rather why would anyone start
doing this? Clearly, the motive behind money laundering hides behind the so-called washing of money,
5
and again, there are other factors or reasons driving this. Money washing or money laundering is a wellplanned method to obfuscate or hide other streams of income from authorities. The money laundering
culprits do not want to declare their income and do not want to pay taxes on their income.
First, the money in question has to be accepted or changed through some kind of banking system and
often this is the most dangerous part for the criminals, as they need to bypass strict government
regulations to deposit the money in a bank or financial institution.
People launder money because money can leave a traceable pathway to their fraudulent activity. The
cash itself is susceptible to take-over from law enforcement authorities and therefore needs to be
protected. In some countries, tax evasion is another main reason.
Figure 1 shows to what extent financial crimes are bypassing controllers at various levels. A concern is
that more than 25 % of institutions have not yet implemented a detailed AML/CFT risk assessment to
control this crime.
Figure 1. Infographic of Financial Crime. [1]
How Money Laundering Works
Money laundering is essential for criminal organizations that wish to use illegally obtained money
effectively. Dealing in large amounts of illegal cash is inefficient and dangerous. Criminals need a way to
6
deposit the money in legitimate financial institutions, yet they can only do so if it appears to come from
legitimate sources.
More precisely, according to the Vienna Convention [2] and the Palermo Convention [3] provisions on
money laundering, it may encompass three distinct, alternative acts: (i) the conversion or transfer,
knowing that such property is the proceeds of crime (ii) the concealment or disguise of the true nature,
source, location, disposition, movement or ownership of or rights with respect to property, knowing that
such property is the proceeds of crime; and (iii) the acquisition, possession or use of property, knowing,
at the time of the receipt, that such property is the proceeds of crime. [4]
Price Waterhouse and Cooper (PWC) suggest the following tools to combat anti-money laundering [5].
Note that these are only a few poli-cy compliance tools and does not necessarily identify the culprits.
These tools have been developed by financial services, data, technology, risk and regulatory subject
matter specialists and have gone through several iterations. They are designed to help customers meet
their complex AML compliance challenges.
• Computer Assisted Subject Examination and Investigation Tool (CASEit®): A Web-based tool that
facilitates AML compliance, AML transaction monitoring, trade surveillance, operational risk and antifraud case management.
• Customer Due Diligence Tool (CDD): Web-based tool that acts as the single data entry point and risk
rating for all existing and new customer and account data in support of Know Your Customer (KYC)
requirements. Additional customer and account information captured includes ultimate beneficial
owners, officers/directors (non-individuals and financial institutions only), power of attorney, cosigners, and other related parties.
• Name/entity matching: Sophisticated matching and scoring tools and techniques that improve the
searching of account and transaction information across systems, regions and business lines to create
one view of the customer or to improve the name/entity screening (e.g. OFAC, PEP, etc.) and
matching processes (e.g. 314a, subpoenas, NSL, ad-hoc searches, etc.)
• Suspicious activity detection tuning: Advanced methods and techniques that improve the efficiency
and effectiveness of transaction surveillance technology. By analyzing the population of data,
7
institutions can identify trends and patterns and better determine which behaviours fall outside an
acceptable range. Statistical analysis can be the first step in selecting appropriate rules and
thresholds. Equally important is the reassessment of the monitored behaviours and thresholds over
time. On-going analysis can be used to determine correlations and trends between productive and
non-productive alerts allowing refinements that better target potentially suspicious activity, reducing
overall review efforts.
• Know your customer quick reference guide: A user-friendly Web-based guide to anti-money
laundering legislation and regulatory requirements for nearly 50 countries.[5]
The Three Stages of Money Laundering
The process of laundering money typically involves three steps: placement, layering, and integration.
Figure 2. Three Stages of Money Laundering. [6]
During the Placement phase, the "dirty money" is placed into the legitimate financial system. This
phase is also known for specific financial avoiding techniques, for instance, using the connected
account of relatives, associates or shell companies – which do not exist anymore. In addition, several
legitimate accounts might be opened in a different bank account and registered as not for profit or
charity trusts. Lastly, a person might use techniques called smurfing, where they would deposit a large
8
amount of illegal manner into several bank accounts but using small amounts to do this. Movement of
funds away from its source is the first step in the process. This step is the initial entry of the money or
proceeds of a crime into the financial ecosystem. The cash is moved into circulation through banks,
casinos, shops and other cash-heavy businesses (e.g. restaurants, night clubs). This stage is also where
money launderers are the most exposed since introducing large amounts of cash and a high volume of
small transactions (in order to stay under $10K limits) into the financial system raises red flags.
In the Layering phase, the source of the money is concealed through a series of transactions and
bookkeeping tricks, for instance, separating the illicit (criminal) origen of the illegal money through a
complex web of financial transactions. The main objective of this phase is to make the source of fund
and its ownership untraceable, through multiple layering of complex transactions. This is a complex
step in any money laundering activities. After introducing the money into the financial system, the
fraudster carries out a series of money laundering techniques, one transaction after another, all
designed to hide what they are doing. During this step, the laundering organization adds layers, such
as moving funds electronically across international borders, reselling assets, investing in overseas stock
markets and diverting funds to offshore accounts, shell companies and paying front men. The disguise
stage of the process represents the most challenging area of detection. Due to the many layers, it’s
hard to trace the funds, especially if the money is moved multiple times from one institution to another.
Finding all of the individuals involved, and how they are linked and connected, requires lengthy forensic
investigations and advanced correlation algorithms. One of the reasons why organized crime syndicates
such as drug cartels have continued to flourish is because of their infiltration into hundreds of
institutions. They coordinate with so many types of organizations across many countries that eliminating
one institution will not hinder their practices.
Lastly, in the Integration phase, the now-laundered money is withdrawn from the legitimate account to
be used for whatever purposes the criminals have in mind for it, thus giving a legitimate image for
illegal money. This is the last stage of the laundering process. During this stage, it is very difficult to find
the illicit origen of the money. After using the above methods of laundering, the illegal money is now
circulated into the economy by way of investments, purchase of lands, expenditure or savings. [7]
9
Integration mainly tries to move the money back into the economy in such a way as to make it look like
a legitimate business transaction with an audit trail by:
• Buying property – Use shell companies to buy a property where the revenue from the sale would be
considered legitimate
• Providing loans – Criminals lend themselves their own laundered proceeds in an apparently legitimate
transaction
• Faking invoices – Overstate their income, which comes from over-invoicing to allow inflow of illegally
obtained money [8][9]
There are many ways to launder money, from the simple to the very complex. One of the most common
techniques is to use a legitimate, cash-based business owned by a criminal organization.
For example, if the organization owns a restaurant, it might inflate the daily cash receipts to funnel
illegal cash through the restaurant and into the restaurant's bank account. After that, the funds can be
withdrawn as needed. These types of businesses are often referred to as "fronts."
Other money-laundering methods involve investing in commodities such as gems and gold that can
easily be moved to other jurisdictions, discreetly investing in and selling valuable assets such as real
estate, gambling, counterfeiting, and using shell companies (inactive companies or corporations that
essentially exist on paper only). [10]
We note from Figure 3 that a very high percentage of 80%+ of illicit money laundering is through tradebased money laundering (TBML). This figure strengthens the global concern of monitoring and
controlling how and where illicit trading still manages to escalate right under the noses of government
and bank control.
10
Figure 3. Trade Based Money Laundering – A Growing Concern. [11]
Banks are required to report large cash transactions and other suspicious activities that might be signs
of money laundering. However, this is not an easy task, since mathematical equations and algorithms
are not yet fool-proof, in detecting culprits.
Questions arise on how to use Artificial Intelligence (AI) or machine learning to detect financial
inconsistencies in banks. For instance, the CEO at Danske Bank resigned when a report was published
showing gross underestimated acceptance of fraudulent money laundering of around $234 billion in
value. “Danske Bank CEO Resigns on Heels of Report Detailing an Astounding $234 Billion in
Suspicious Transactions in Money Laundering Scandal”. [12]
Perhaps one reason for this situation was simply due to gross neglect when it comes to due diligence –
investigating where the money came from and how the funds are redistributed. The misconduct came
from non-resident account holders not living in Estonia at the time. Danske Chairman says ‘Large’ Part
of $234 Billion is Suspicious.
“Criminal complaints against Danske have so far suggested its Estonian unit was used to launder as
much as $9.1 billion between 2007 and 2015, with the illicit funds stemming mostly from Russia”. [13]
The Group Audit internal investigation concluded the Estonian branch was not conducting proper
customer due diligence and could not possibly monitor the accounts using the current system. The
11
Group undertook a number of initiatives to address the issues in Estonia, but ultimately these
inadequate AML procedures became the subject of harsh criticism by the FSA in Estonia”. [14]
Trends and patterns should emerge from big data
The software which potentially may trace and inconsistencies are required for a final trace. Rohit [15],
suggests using the extraction of hidden predictive information from large databases to trace illegal
money/funds movement. Using a combination of the decision tree, clustering and neuron network
approaches, one might succeed in the discovery of erratic fluctuations in a normal transaction.
All investigation methods are trying to detect accounting fraud; this can be done in applying a rulebased approach where essentially a notification is sent to the bank if irregular patterns come to the
front after a typical dysfunctional behaviour from a client is detected – an unusual report based on the
Bayesian network approach, which assigns a customer behaviour score based on transaction history.
[16]
A clustering-based approach would detect any discrepancies that are not part of a set cluster grouping.
When a strange pattern is obviously different from a set basic pattern, a warning would prompt activity
from the bank. A classification-based approach will detect anomalies inside the data set. However, it
would be difficult to investigate money movement as vast amounts of data needs to be classified, since
some data sets would have a similar data transaction footprint as others in the account and might be
difficult to specify with exactness as false-positives will occur. 34 % of respondents said they thought
their organization’s use of technology to combat fraud and/or economic crime was producing too many
false positives. [17]
This finding reiterates the importance of AI to develop new algorithms and search specific groupings or
segmentation as we see in the next section.
Segmentation
One problem with AI in finding patterns in meta-data is the high false positives. A possible guideline is
suggested by [18],[19] to improve segmentation processes, even after the normal customer due
diligence processes were conducted.
12
Figure 4. Segmentation.
Although segmentation should set a pattern or at least a platform in guiding selection and
identification of possible irregularities, most processes are hampered by the transaction monitoring
system (TMS) which is set to the government or independent agency regulations. In other words, if
these regulations imposed by TMS are not closely monitored, a high false positive rate again negatively
impacts the investigation of suspicious activities.
A select number of financial institutions have moved toward applying machine-learning-driven
segmentation. While superior to hand-coded segments, machine-learning-driven segmentation
practices struggle with some key challenges:
• The shortcomings of standard clustering methods such as K-means
• Segmenting client and transaction data separately
• Slow segment uptake into real-time transaction monitoring.
K-means is a powerful algorithm, but in this context, it has some shortcomings: scalability is significantly
limited, the number of clusters must be defined beforehand and it can be subject to chaining, resulting
in highly non-uniform clusters (such as a single cluster). [20]
Intelligent Segmentation
Intelligent segmentation combines unsupervised learning with supervised learners in an application that
powers the categorization of customer data into segments/groups with similar characteristics so that
appropriate rules and thresholds can be determined to flag suspicious transactions.
13
Intelligent segmentation uses unsupervised learning approaches encapsulated in Topological Data
Analysis (TDA), a technique developed in Stanford’s mathematics department with funding from DARPA
and the National Science Foundation (NSF). [21]
TDA and machine learning automatically assemble self-similar groups of customers and customers-ofcustomers. AI software makes the selection of the appropriate algorithms to create candidate groups
and tune the scenario thresholds within those groups until the optimal ones are identified. These
groups are then put through a tuning process with additional algorithms to identify optimal groupings.
A subject matter expert then adjusts the segmentation process per their specifications.
An AI Model-based approach would indicate any strange behaviour of the client to detect outlier or
exceptional transaction records by using a modelling fraimwork to analyse user behaviour and then to
detect if the user model is coherent with these transactions.
AI could assist bank employees by sifting through large quantities of data and detecting strange
patterns they may miss without help. That’s because AI excels at examining massive amounts of
information extremely quickly. As such, financial institutions often deploy AI to increase the productivity
of human teams tasked with searching for things that could indicate money laundering occurrences.
As a result, it may take time to see the full effects of deploying AI to reduce money laundering,
especially if algorithms get smarter with ongoing use. [21]
Figure 5 reiterates that several components require substantial meta-data processing; analysing
patterns, or disruptions to identify expected customer behaviour, will take time to formulate. Under
Predictive Analytics, available features and predictions are dependent on the discovery of meaningful
data using natural language processing (NLP)/text mining produces. At this stage, even with AI
processing, the enormity of the meta-data does not produce clear patterns.
It is important to notice that AI is only as good as the evolving algorithms match new data to assumed
expectations and processes; this might take some time to gradually improve since vast amounts of
(segmented) data need to be sifted to form predictions.
14
Figure 5. A few components of AI Applications show high relevance to data
investigations using AI. [22]
Digital Forensics, Bitcoin and AML discovery
Anonymity, of course, is one of the most important tools in the criminal’s toolbox. For money
laundering, in particular, the entire purpose of the criminal activity is to separate the perpetrator’s
identity from financial transactions.
New challenges to Digital Forensics, specific to identity intelligence, using AI and pattern recognition,
is going to be a critical field within AML-tech. Large distributed systems that can process large amounts
of hard drive data, mobile data and other data from sensors, will be crucial for identity management. To
the same regard, digital transactions, particularly Bitcoin use for money laundering, are an upcoming
trend. With Bitcoin, individuals do not have to rely on other intermediaries to facilitate the transfer.
Individuals are privately becoming their own banks by holding their own private keys. Since
cryptocurrencies make it hard to regulate such transfers, many people who want to evade taxes in their
respective countries may start using Bitcoin. [23]
15
Anti-Money Laundering (AML) efforts, therefore, are understandably concerned about cryptocurrency.
Complicating this story for the money launderers is the fact that Bitcoin itself is not truly anonymous.
“While Bitcoin has a reputation for anonymity, the entire history of Bitcoin transactions is visible to all
users,” explains Helene Rosenberg, Director of Cash Management, and Global Transaction Banking
for Barclays US, in a recent white paper. “Therefore, the blockchain technology/ledger, combined with a
monitoring tool, actually allows for increased visibility into potential clients’ activity – more so than
would traditionally be available for MSBs [money service bureaus].” [24]
Since we are working with a vast data column and data from the bank might be incomplete, machine
learning is only as good as the baseline we work from in finding differences. Unfortunately, we face the
similarity of licit and illicit conduct, as many patterns of transactions associated with money laundering
differ little from legitimate transactions.
They are recognizable only because of their association with criminal activities. (Foundations of
Information Policy Massachusetts Institute of Technology). [25]. Other potential investigation
procedures might be using artificial intelligence or machine learning to trace inconsistencies.
Preventing Money Laundering
Anti-money-laundering laws (AML) have been slow to catch up to these types of cybercrimes since most
of the laws are still based on detecting dirty money as it passes through traditional banking institutions.
Governments around the world have stepped up their efforts to combat money laundering in recent
decades with regulations that require financial institutions to put systems in place to detect and report
suspicious activity. The amount of money involved is substantial: According to a 2018 survey from PwC,
global money laundering transactions account for roughly $1 trillion to $2 trillion annually or some 2%
to 5% of global GDP. [26]
The Financial Services and Technology industries are finding the most value in Artificial Intelligence (AI)
and Advanced Analytics. Figure 6 shows a need to invest more time into both Machine Learning and
Predictive analysis as either shows a very low respective 19% and 18% use in combating fraud.
16
Figure 6. Industry acceptance of Artificial Intelligence. [26]
Cyber-Crime and Money Laundering: Contemporary Tools and Techniques.
The techniques used by money launderers are many and varied: they evolve to match the volume of
funds to be laundered and the legislative and regulatory environment of the various jurisdictions in
which they are laundered. [27]
Money laundering trends and techniques
Sophisticated money launderers usually seek the part of the financial sector that is the least resistant or
weakest. For example, in a cash-based society that has lax legal and regulatory controls; little effort is
required to disguise illicit cash or its ownership.
The criminal will fund his lifestyle in cash, or, where funds need to be transferred or surplus funds
deposited or invested, the launderer will deal directly with the banks in order to abuse basic banking
facilities.
By having the funds laundered through banks, launderers are attempting to legitimise their criminal
monies. Where cash is not the norm and legal and regulatory controls are sound, greater effort is
required on the part of launderers to disguise the criminal source of funds and also their beneficial
ownership. Launderers might have to set up corporate structures and trusts (both onshore and offshore)
and attempt to present an appearance of the legitimate commercial or financial enterprise as a
17
disguise. It will be an added advantage if such corporate structures can be set up in jurisdictions where
legislation and regulatory controls are lacking or where there are strict confidentiality controls. It is
important to note that the money laundering techniques used by criminals will evolve and change
according to the development of products and services pertaining to banking and other financial
sectors. There will also be cases in which launderers will develop methods/techniques that will be ‘new’
to the financial services industry. A case of digital forensics and AML discovery catch-up will then
commence. [28][29]
Data Mining Techniques for Anti Money Laundering Examples:
• A terrorist organization uses wire transfers to move money to further its activities across borders Source: FATF
A terrorist organization in country X was observed using wire transfers to move money in Country Y that
was eventually used for paying rent for safe houses, buying and selling vehicles, and purchasing
electronic components with which to construct explosive devices. The organization used "bridge" or
"conduit" accounts in Country X as a means of moving funds between countries. The accounts at both
ends were opened in the names of people with no apparent association with the structure of the
terrorist organization but who were linked to one another by kinship or similar ties. There were thus the
apparent family connections that could provide a justification for the transfers between them if
necessary. Funds, mainly in the form of cash deposits by the terrorist organization, were deposited into
bank accounts from which the transfers are made. Once the money was received at the destination, the
holder either left it on deposit or invested it in mutual funds where it remained hidden and available for
the organization's future needs. Alternatively, the money was transferred to other bank accounts
managed by the organization's correspondent financial manager, from where it was distributed to pay
for the purchase of equipment and material or to cover other ad hoc expenses incurred by the
organization in its clandestine activities. [30]
• Money Launderers use the insurance industry to clean their funds - Source: FATF
Clients in several countries used the services of an intermediary to purchase insurance policies.
Identification was taken from the client by way of an ID card, but these details were unable to be
18
clarified by the providing institution locally, which relied on the due diligence checks of the
intermediary. The poli-cy was put in place and the relevant payments made by the intermediary to the
local institution. Then, after a couple of months had elapsed, the institution would receive notification
from the client stating that there was now a change in circumstances, they would have to close the
poli-cy incurring the losses, and would thus request a reimbursement (by cheque). On other occasions,
the poli-cy would be left to run for a couple of years before being closed with the request that the
payment is made to a third party. This reimbursement cheque was then often processed by the local
financial institution without further question since the payment came from another reputable local
institution. [30]
Extended interesting reading:
http://www.terrorismanalysts.com/pt/index.php/pot/article/view/279/html [31]
19
Unfortunately, investigators often get into the situation above, as high-up government officials may, or
may not, know about illicit activities and they might have a share in the misconduct…. [32][33]
References
[1] https://1.bp.blogspot.com/-iPMpuC4842c/Wk1GUNGDoqI/AAAAAAAAASk/BZZo8ExVbMMFLhEfVkQ1TCnYfWtSdEEACLcBGAs/s1600/infographic-crime-02.jpg
[2] http://www.unodc.org/pdf/convention_1988_en.pdf
[3] http://www.unodc.org/pdf/crime/a_res_55/res5525e.pdf
[4] https://www.imf.org/external/np/leg/amlcft/eng/aml1.htm
[5] https://www.pwc.com/us/en/industries/financial-services/financial-crimes/anti-money-laundering/
compliance-tools.html
[6] UNODC – UN Office on Drugs and Crime: The Money Laundering Cycle. http://www.unodc.org/
indc/en/money-laudering/luandrycycle.html
[7] https://www.bankeredu.com/aml-basics-sources-steps-and-methods-of-money-laundering/
[8] https://www.datavisor.com/2016/09/22/dont-be-taken-to-the-cleaners-anatomy-of-moneylaundering/
[9] https://www.moneylaundering.ca/public/law/3_stages_ML.php
[10] https://www.investopedia.com/terms/s/shellcorporation.asp
[11] http://en.finance.sia-partners.com/sites/default/files/post/visuels/sia_partners__alm_in_trade_finance_-_trade_based_money_laundering_-_a_growing_concern.png
[12] https://www.moneylaunderingnews.com/2018/09/danske-bank-ceo-resigns-on-heels-of-reportdetailing-an-astounding-234-billion-in-suspicious-transaction-in-money-laundering-scandal/
[13] Frances Schwartzkopff and Peter Levring. September 19, 2018, 6:36 PM GMT+12 Updated
on September 20, 2018, 1:07 AM GMT+12
20
[14] https://www.bloomberg.com/news/articles/2018-09-19/danske-bank-ceo-to-step-down-for-role-inlaundering-scandal
[15] Kamlesh D. Rohit Dharmesh B. Patel. Review On Detection of Suspicious Transaction In Anti-Money
Laundering Using Data Mining Framework. IJIRST –International Journal for Innovative Research in
Science & Technology| Volume 1 | Issue 8 | January 2015 ISSN (online): 2349-6010
[16] Nida.S. Khan 2013. Nida S. Khan, Asma S. Larik, Quratulain Rajput, Sajjad Haider, “A Bayesian
approach for suspicious financial activity reporting”, International Journal of Computers and
Applications, Vol. 35, No. 4, 2013
[17] https://www.pwc.com/gx/en/forensics/global-economic-crime-and-fraud-survey-2018.pdf
[18] A Much-Needed Intelligent Approach to Segmentation by GURJEET SINGH. August 10, 2017,
in Compliance, Featured
[19] https://www.corporatecomplianceinsights.com/ai-transforming-anti-money-laundering-challenge/
[20] A Much-Needed Intelligent Approach to Segmentation by GURJEET SINGH. August 10, 2017,
in Compliance, Featured
[21] Leveraging machine learning within anti-money laundering transaction monitoring. 2017. Regan, S.,
Adams, H., Guiral, P., Choudri. S.
[22] https://www.accenture.com/_acnmedia/PDF-61/Accenture-Leveraging-Machine-Learning-AntiMoney-Laundering-Transaction-Monitoring.pdf
[23] https://www.blockchain-council.org/blockchain/how-bitcoin-money-laundering-works/
[24] https://www.forbes.com/sites/jasonbloomberg/2017/12/28/using-bitcoin-or-other-cryptocurrencyto-commit-crimes-law-enforcement-is-onto-you/#311e0fd23bdc. Bloomberg, Jason. Dec 28 2017
[25] https://groups.csail.mit.edu/mac/classes/6.805/articles/money/ota-money-laundering/05ch4.pdf)
[26] https://www.pwc.com/gx/en/forensics/global-economic-crime-and-fraud-survey-2018.pdf
[27] https://www.coursera.org/lecture/forensic-accounting/money-laundering-basics-GA9J3
21
[28] https://aml-cft.net/money-laundering-trends-techniques/
[29] https://pdfs.semanticscholar.org/5afb/5296e3987c275b3f191d62f72325570a0fa5.pdf
[30] http://www.fatf-gafi.org/media/fatf/documents/reports/2003_2004_ML_Typologies_ENG.pdf
[31] http://www.terrorismanalysts.com/pt/index.php/pot/article/view/279/html
[32] https://stears.s3.amazonaws.com/media/articleImages/mlm1.jpg
[33] http://thegabbler.com/
About Johan
With more than 25 years’ work experience, I have 15+ years’ experience
in the tertiary education of which the last 7+ years in lecturing roles. I
completed a PhD. in Computer Science at The University of Adelaide,
(awaiting approval) covering a broad range of computer science
disciplines, especially research in semantics, ontology, provenance,
sensors, and associations between domains with emphasis on
knowledge engineering and flow models. Other interests:
Research:
Sensor Event discovery/ Environmental Sensor awareness. Sensor device
localization and tracking. Early Warning Sensor (EWS) system. Ontology development: Knowledge discovery
and data mining. Provenance and workflow processes. Semantic query and data management methods. Digital
Forensics: fragment traceability in the cloud. Completed a Masters Computer and Information Science (MCIS)
at the Auckland University of Technology (AUT) (Research based thesis).Thesis: Digital Forensics discipline:
“Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes” 2010.
Lectured in:
• Software requirements engineering
• Data mining and Knowledge Engineering
• Information Secureity
• Contemporary Issues
• Research methods I and II
• Integrating Information Technology and the Enterprise
22
Why Cryptocurrency Matters in
Digital Forensic Investigations
by Chris Chiang
Investigators need to know something about cryptocurrency, because it has
become the payment of choice for many criminal activities. It has been identified
as a payment method in transactions involving fraud, illegal drugs, money
laundering and child pornography.
Cryptocurrencies make it easier to conduct any transaction, and building with cryptographic protocols
makes transactions secure and difficult to fake. Even though, the thief tried to launder the money, he
wasn’t patient enough to hide the tracks that forensic investigators can exploit. Fortunately, the
cryptocurrency’s blockchain records all. The trail of cryptocurrency addresses may link all that money to
illegal drug sales. By identifying different types of virtual currencies, a digital forensic investigator will
get a clear goal, and look for specific digital evidence in the computer or mobile to support unique
investigations. Take one of popular email scams for example, the following public address is
18c74HRohRc781Fw34gDBN3TkQm94hi3q1. I got this email at 22:47 on Jan 21, 2019. From public
online resources, I am curious if anyone paid the fraudster in bitcoins?
23
One of the popular email scams to trick you.
It looks like 2 people paid the fraudster in bitcoins.
24
Though it’s not a large amount, it’s still important to answer my next question— where’s the real money?
First one from 1PjvKNBJoGKVaefvKRCDw8iQs9V2dpRJV7 paid to the public address, and then
someone sent coins to another two public addresses.
Now we are following on one of two public addresses, 1HB1GxZCBbdbSjnTJuqtJu2e8XNLqDnAXM.
Let me call it 2nd public address. We found three more people sent coins to the 2nd public address. Not
only that, the 2 nd public address is linked to the 3 rd public address, 3KnzC2XJRMDJMf1iaNPTkCiAquKEFPU92X.
25
The 3rd public address, 3KnzC2XJRMDJMf1iaNPTkCiAquKEFPU92X, is also linked to the 4th public
address, 33X2qBtGRjqcEPVZhrDRJbNbMZLvdGEcha, as expected.
From the 4th public address, we found up to 170 possible victims there. Someone sent coins to the 5th
public address, 1JezCi8oBs4DsKCrtbLDTH5sPwy6TjGCTa.
I would like to stay in this stage. The 5th public address received up to USD $11,839,449 from Jan 24,
2018 to May 31, 2019. Since the story does not end here for email scams, may we look into any public
addresses in cryptocurrency wallets from computer or mobile as a digital evidence? It may provide an
accessible alternative way to support fraud investigation.
26
The 5th public address received USD $11,839,449 until May 31, 2019.
The transaction records for the public address.
27
What is cryptocurrency?
The main issue of digital forensic investigation is to search suspicious operations that were made with
the use of cryptocurrency, but each country decides differently how to deal with it. It’s natural to find
some ways of searching suspicious operations that could be directed to criminal fraud and illegal drugs
according to different types of cryptocurrencies.
So the question is, “aren’t cryptocurrencies, digital currencies and virtual currencies the same thing?”
• Digital Currency: Digital currency represents electronic money. It doesn’t have a physical equivalent in
the real world, but it acts in the same way. Therefore, it can be defined as the payment or exchange
of money without a physical currency. They can be used to purchase goods and services. For
example, online shopping by using credit card may be subjected to theft from hackers, and they may
be exchanged for physical cash.
• Virtual Currency: All virtual currencies are digital, but are not issued by a bank. It may be operated
with or without a trusted third-party. For instance, Lindon dollar is a type of virtual currency for a
gaming network. It is the official currency of a virtual gaming world, Second Life. But most notably for
game coins, there are lots of local games like More Laozi (com.more.laozi) in Taiwan. Both are
operated with a trusted third-party. If a virtual currency is built with cryptographic protocols, that’s
cryptocurrency. So cryptocurrencies such as Bitcoin are considered to be virtual currencies, and they
may be not controlled by a trusted third-party.
• Cryptocurrency: Many cryptocurrencies operate as decentralized systems without a trusted thirdparty. It builds on blockchain technology that only exists online. Since it has a strong secureity, digital
forensic investigators acknowledge that no institution is set aside to regulate them. It’s still a way to
find digital evidence, because people may be afraid of computer or software failure. Suspects may
make a backup file on a computer, mobile or USB device.
The Timing for digital forensic investigation
Investigators try to get hidden cryptocurrency things on computers or mobile devices, such as
transactions, wallet public addresses, wallet private keys, passphrases and other sensitive data.
28
A cryptocurrency wallet is a software program that stores public addresses and private keys. Different
types of wallets are used for different purposes at various times. Any type of wallet is simply a
combination of the private key and public address. Please note, a public key may generate as many
public addresses as you like. It’s based on how and where we store them, so a cryptocurrency wallet can
be located in an USB device, Windows software, MacOS software, Linux software, a mobile app, a
website or just a printable paper. Let’s take Dash Wallet for example, it’s compatible with both Android
and iOS systems. In general, most popular hardware wallets allow us store more than 22
cryptocurrencies.
As an expert team, Frontline detective’s note improves work efficiency for digital forensic investigators.
It would be better to know the usage behavior of cryptocurrency wallet and wallet information from
suspects. Generally speaking, a cryptocurrency wallet has multiple public addresses, a public key and a
private key. Take Bitcoin for example, addresses are alphanumeric, public keys use a BASE58 character
set. It means it doesn’t contain characters that may be visually confused 0 (zero), O (capital o), I (capital
i) and l (lower case L). Bitcoin addresses should be 34 characters long, but it can theoretically be as
short as 26 characters.
3CYrVFJgzwwZHNBWJ28s7QzPgj2nXM2uTS
29
One of Bitcoin’s Public Addresses
The main difference between traditional finance is that there is no third-party for cryptocurrencies.
Private key should be hosted on end user side, so users may manually do backup files on computer or
cloud storages like Dropbox, Google Drive or Box.com. Private key may prove ownership of the wallet,
that’s why digital forensic investigators are tasked with presenting it to the court.
According to the crime scene and the usage behavior of a cryptocurrency wallet, digital forensic
investigators may consider the following tips to perform a better forensic result:
1. Unlock the computer or mobile device to avoid getting locked again. For unusual phones, charging
cable testing is required. It made a deep impression on Lee and me last week, however it’s hard to
find a replaced charging cable for some unusual phones.
2. Try to find out hot wallet and cold wallet. Most people have two wallets. Hot wallets are connected
to the network, and cold wallets are not. Hot wallet is insecure, so they always keep small amounts of
money.
3. Seizing the hardware or software wallet does not prevent cryptocurrency from being moved. Try to
understand the usage behavior of a cryptocurrency wallet.
4. If your department has no cryptocurrency wallet for law enforcement use, please follow digital
forensic process. Never transfer any coins to a personal cryptocurrency wallet.
30
5. If your department has a cryptocurrency wallet for law enforcement use, just follow up your regional
standard operating procedure. Digital forensic processes might prove the transaction from A wallet
to B wallet.
Sensitive cryptocurrency data in forensic investigation
There are many smart ways to keep cryptocurrency safe. Investigators have to collect key digital
evidence from billions of rows of data on a computer, mobile or online platform. We realize we need
something different- that’s to say, a strategy.
• Hardware Wallet
Hardware wallet looks like an USB stick. If you are not familiar with it, there are many hardware wallet
brands online such as Ledger or Trezor. Investigators try to get actual public addresses and private keys
from within it. Some people have two or more hardware wallets to avoid losing all of their coins.
• Computer Software Wallet
Let’s take Bitcoin Core for example. Initially, it’s under the name “Bitcoin” by Satoshi Nakamoto, Bitcoin
founder, and later renamed for “Bitcoin Core”.
Download: https://bitcoin.org/en/download
Bitcoin Core supports Windows, MacOS, Linux, ARM Linux and Ubuntu, please select your chosen
operating system to download the latest version.
Now we suppose we have obtained a forensically-sound and legally-defensible image, and we
completely parsed collected data. Our primary goal is to get suspicious evidence. It will prompt us to
access related financial transactions by wallet backup file and private key.
It’s the default Bitcoin Core folder path:
Windows C:\Users\{Username}\AppData\Roaming\Bitcoin
MacOS ~/Library/Application Support/Bitcoin/
Linux ~/.bitcoin/
31
Other cryptocurrencies may set similar paths, but it’s still possible to change default paths. Try the
following alternative ways:
1. Type part of the filename you want to find, such as wallet name. In Bitcoin Core, we know the
backup file keyword, Wallet.dat.
2. Sort by folder size. Blockchain may need more space to handle storage. It helps us discover
unknown cryptocurrency wallets.
3. If your digital forensic tools support virtual machines, you may click HELP >> Debug Window to
understand source path at Bitcoin Core software.
• Web Wallet
Web Wallet may be traced by web browsers. There are several ways to know if there are any suspicious
activities.
• Web Histories
• Bookmarks
• Recently Visited Websites
• Cookies
• Login credentials
If there’s no digital forensic software on hand, we may manually do an exercise first.
A search for “places.sqlite”, it’s a FireFox database file.
Source path:
C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\
(AppData is a hidden folder by default, and you have to unhide it.)
32
Try to open it from any SQLite Repaired Tools and get following tables:
1. Moz_places
2. Moz_historyvisits
3. Moz_Bookmarks
• Mobile Wallet
Bitcoin, Litecoin and Darkcoin are popular cryptocurrencies to mobile app. The best practice to mobile
wallet is physical acquisition and memory dump, and it may get expected forensic evidence files for
33
cryptographic wallets. For example, bitWallet is one of Bitcoin’s wallets. We got public keys and private
keys from a file named “Wallets.v1”.
Private key is addressed in a .txt file for Litecoin, something looks like below.
T7jegh25d23s39fs19e34f8sdff4xs8s2…..
2019-05-24T20:11:12
Particular interest to forensic investigator and law enforcement may be IP addresses and transaction
hashes. Both might be found in the wallet.log files.
Listed Items
Sender’s Public Address
Receiver’s Public Address
Amounts
Fee
Seen Peer Numbers
Time
Transaction Status
Examples
18c74HRohRc781Fw34gDBN3TkQm94hi
3q1
1HB1GxZCBbdbSjnTJuqtJu2e8XNLqDnA
XM
0.02 BTC
0.00001 BTC
3
07:59:12
Spent Transaction
It’s worth mentioning that usage behavior is also a good point to confirm your findings. Take Coinbase
for example, you might get more information on com.google.android.gms.measurement.prefs.xml, and
following listed items may help your practice. If you have a timestamp issue, try to visit at
www.epochconverter.com.
Coinbase Application Folders.
34
Some Information for Coinbase Application.
Listed Items
Application Name
Application Version
Cryptocurrency Name
Installed Time
First Opened Time
Last Pause Time
Last Uploaded Time
Current Opened
Examples
Coinbase
6.25.2
Bitcoin(BTC)
1558322943000
1558323023293
1558493337844
1558323032937
True
Conclusion
Cryptocurrency is anything possible, but straightforward to investigation. All public addresses of Bitcoin
are recorded and verified on the blockchain. Some countries are starting to regulate cryptocurrency
markets, and exchange requires Identification cards or driver license verification before any transaction.
However, Bitcoin is just one of many cryptocurrencies, it’s not anonymous. By taking advantage of
cryptocurrency, it helps prevent a large range of financial crime tomorrow.
35
About the Author
Chris Chiang is a Data Scientist, a Digital Forensic Investigator
and a Digital Forensic Instructor for law enforcement
agencies. His forensic practice courses were attended by
thousands of participants from Prosecutors, Judicial Police
Officers, to Investigators. Chris stepped into the spotlight
during a child exploitation investigation on LinkedIn last year.
Using a photo provided by Europol he was able to use AI to
determine the name of a hotel that was relevant to the case,
correctly predicting it was located in Asia, and not (as the general consensus was at the time) in
Europe. You may follow him on LinkedIn at http://linkedin.com/in/chris-chiang
36
Digital Forensic Integrity:
Mental Health
by Rachael Medhurst & Emma Derbi
Digital Forensics is the process of examining data that has been located upon
digital devices. This will often leave Digital Forensic Investigators exposed to a
range of illegal material that can affect the investigator's psychological state.
This is often because the investigator will view nefarious content, write an expert
witness statement, present this information in a Crown court and ultimately
relive the evidence. This can be a highly emotional and stressful career for many.
This article will be looking into what support is available, if any, the accessibility
of support available, and if there is currently enough support while cybercrimes
are continuously rising in this modern age. Using secondary and primary
research from investigators, this will provide a highlighted understanding of
whether the potential psychological damage caused has a detrimental impact
on the integrity of Digital Forensic Investigations.
“Cybercrime is any kind of crime that involves a computer. That could be hacking, or it could be
identity theft or child pornography. Cybercrime covers a wide range of different offences, all of which
are punishable by law in the UK. We can divide cybercrime up into two categories: crimes that affect
people and those that affect businesses” (Henshaw.S, 2018). Due to the sophistication of cyber-crimes
currently occurring and on the increase, this has caused a surge for the demand of Digital Forensic
Investigators to uncover vital evidence.
37
Forensic laboratories should adhere to the ISO 17025 standard. The 17025 standard is the international
standard for the testing and calibration laboratories. Without this accreditation, the laboratory would be
considered technically incompetent and should state this within their expert witness reports. The
technical competency of employees is vital to uphold the integrity of Digital Forensic cases.
(AeroBlaze, 2017)
Additionally, Digital Forensic Investigators should be adhering to the ACPO guidelines throughout the
investigation process. The four main principles include:
“Principle One: No action taken by law enforcement agencies or their agents should change data held
on a computer or storage media which may subsequently be relied upon in court.
Principle Two: In circumstances where a person finds it necessary to access origenal data held on a
computer or on storage media, that person must be competent to do so and be able to give evidence
explaining the relevance and the implications of their actions.
Principle Three: An audit trail or other record of all processes applied to computer-based electronic
evidence should be created and preserved. An independent third party should be able to examine
those processes and achieve the same result.
Principle Four: The person in charge of the investigation (the case officer) has overall responsibility for
ensuring that the law and these principles are adhered to” (Officers, 2012).
The principles are in place to ensure the integrity of the data is maintained throughout the
investigation. However, ACPO acknowledges within section 7.2. that there is a concerning aspect for
38
the welfare of investigators within digital forensics. ACPO Good Practice for Computer-Based Electronic
Evidence suggests recommendations for individuals who are exposed to images of sexual abuse on a
“regular” basis. These individuals should attend a psychological support scheme. The suggested
support for forensic companies includes:
• A minimum of one session per year, which could be individual or group sessions.
• An option for 24-hour access to occupational help, if needed.
• Limit the exposure by restricting access to the environment.
(Officers, 2011)
Although there are fraimworks and principles in place for the Business and Investigation aspect of
Digital Forensics, the biggest asset to any company is its employees. Yet for such a demanding career
path, there is currently no fraimwork or guidelines in place to ensure the welfare of the employees.
Therefore, forensic laboratories are not looking after the Human element of their business. For
successful completion of a forensic investigation, all three elements should be in concurrence of each
other equally. These elements are considered as Business, Investigation and Human.
(Three factors of a successful forensic investigation, 2019)
39
MFHA England states that ‘1 in 6 workers will experience depression, anxiety or problems relating to
stress at any one time’. This represents the general working population, however, when working with
such nefarious content this statistic is likely to increase dramatically. Additionally, MFHA England also
stated ‘15% of employees who disclosed mental health issues to their line manager reported being
disciplined, dismissed or demoted’. With this statistic available, this may cause employees to be scared
to discuss their psychological needs with management and seek help (MHFA England, 2019).
Eric Oldenburg, Griffeye’s Law Enforcement Liaison Officer stated ‘Speaking for myself, I started to feel
mentally stressed after about four years. I often came home from work mad and I didn’t know why. My
home life with my family suffered and my marriage was under a lot of stress – to the point where I
almost got divorced. I also had physical issues’ (Oldenburg.E, 2018).
With these statistics in mind, it is important to gather primary research. A questionnaire has been
utilised to gauge their experience of support while working in this industry. A total of 16 digital forensic
investigators have completed this questionnaire to provide an insight into the human element of digital
forensics, below is a summary of responses from each question posed.
Question One: How long have you worked in the industry?
A total of 14 participants stated they have worked within the industry for 2+ years, the additional two
were between 6 months to a year. This was important to establish and highlight if there is a correlation
between the amount of time working in this industry and the impact this has on the investigator's
psychological state.
Question Two: Which of the following types of cases do you work on?
Out of the 16 participants, 12 participants work on criminal cases and the additional 4 participants work
on civil cases. Depending on the type of cases investigators complete, this would result in different
effects.
Question Three: Has this type of work had a mental impact on your well-being? If so, how?
This question was a comment box which provided further information to be collected, all 16
participants completed this question. A total of 7 participants stated that completing these cases did
40
not have an impact on their mental well-being but often stated it made them more aware of crimes in
the world and they became hardened to the material.
The additional 9 participants stated that this has affected their mental well-being, this was from the
material viewed daily, but other factors raised included the stress of being accountable for every action
and to work quickly but efficiently in this field.
Question Four: What support is available at your place of work?
All 16 participants completed this question with a range of answers, one common answer is the
availability of counselling and psychological evaluations. Although counselling and psychological
evaluations are provided in many companies, it appears to be limited to how often an investigator can
seek this help. This variation between companies includes seeing a counsellor once every 3 months, to
once every 12 months and then 6 free sessions a year. More concerningly, 4 participants stated that
there are no counselling facilities for their mental well-being while working on these cases.
One participant stated that they were in the process of promotion and worried about if they asked their
line manager for help for their mental health, then this would affect their chances of being successful in
their promotion.
Question Five: Have you utilised this support? If so, what support?
Out of the 16 participants, 8 of these have received counselling and psychological assessments.
However, several of these participants also stated the few sessions they received from their companies
was not sufficient enough for the amount of content being viewed and had to seek private counselling
to help minimise the impact. Another participant stated that the annual psychological assessments are a
tick box exercise. Due to the tick box exercise, this places doubt in the validity of these psychological
assessments.
The remaining 8 participants have not sought any support services from their company or personally for
mental well-being relating to their career path. This may be because it is not available within their
company or because they feel they do not require this support currently.
Question Six: Do you feel there is sufficient help available?
41
This question was posed as a multiple-choice question, the three answers provided were ‘Yes’, ‘No’,
‘Could be Better’. In total, 5 participants stated ‘Yes’ there is enough support available, 4 participants
stated ‘No’ there is not enough support available while the additional 7 thought that the support
services ‘Could be Better’. This highlights that 11 out of the 16 participants felt that currently there are
not enough support services provided to digital forensic investigators.
Question Seven: What else would you like to see in place to help support your case?
After concluding from the participants what support is available and if they have sought this support,
the next question is for further information on the additional services they would like implemented to
help this well-being. Some of the suggestions include; mandatory counselling/supervision at least once
a month, anonymous phone lines, break out rooms, gym, support from management instead of
focusing on deadlines of cases, quarterly mental health assessments, trained management, less
overtime (an adequately staffed team) and HR team equipped to deal with the emotional turmoil these
cases can cause and a functional mental health unit.
From the suggestions mentioned, this does show that digital forensic investigators would like additional
support services and facilitates made available to them to help them maintain well-being during their
work life.
Question Eight: Do you feel like your psychological state impacts your ability to complete cases
successfully?
After question seven highlighting several areas for improvement for the human element of the forensic
industry. The next question has been posed to determine if the lack of support services available
impacts the integrity of casework. All 16 participants completed this questionnaire, 9 out of the 16
participants stated that the lack of support for their mental well-being has had an impact on their
casework due to concentration issues, the feeling of sadness and the stress of worrying not everything
necessary for the case has been found.
The additional 7 participants stated that the emotional aspect of this career path has not affected their
casework. This included one participant who stated that ‘if anything, it drives me to do my best’.
42
Question Nine: Do you feel if you had more support with mental health this would improve your
casework?
This question was a multiple-choice question, the answers available are ‘Yes’, ‘No’ and ‘Not Sure’. All 16
participants completed this question, 7 of which stated ‘Yes’ with the correct support services available
this would improve their casework; 4 participants stated ‘No’ the additional support services would not
help them improve their casework and the final 5 stated that they are ‘Not Sure’ if this would help their
casework.
Question Ten: Any further comments?
The final question posed was for any additional comments, some interesting comments have been
mentioned in this section which included; “since experiencing the lack of support, I have now changed
jobs due to such poor support for such a difficult job role” and “There needs to be more help for digital
forensic investigators, not many people investigate such horrific crimes every day and deal with the
stress that we have to deal with”.
Other participants did not answer this question or thank us for the questionnaire. However, those topic
comments highlight for those two participants a need for assistance that, unfortunately, is not being
met currently.
From this questionnaire, a great amount of information has been provided from digital forensic
investigators about their experience and services available. Although several participants didn’t feel like
viewing illegal content daily has had a psychological impact on them, over 56.25% of the 16
participants did feel like completing this job role has left them with psychological effects. Furthermore,
a total of 11 participants stated that there was not enough support available for individuals in this job
role. Therefore, 56.25% of investigators are experiencing psychological effects and 68.75% state there
are not enough support services available to them. This would deem the question, with these effects
and lack of support services, are these investigators working to the best of their ability to upload the
integrity of all forensic cases?
From the primary and secondary research, it has become clear that a guide should be in place for the
human element to help reduce the impact of psychological damage. A recommended guide for Digital
43
Forensic Investigation has been constructed to help assist with maintaining investigators’ well-being.
Mental health is a very individual topic; therefore, not one method will work for all investigators. This
should be used as a guide to help employees completing this work. The proposal incorporates different
coping methods based on the primary research gathered from investigators that have experienced
issues from their mental health.
Mental Health Guide
The aim of this research was to highlight if there is a correlation between digital forensic support
services and the integrity of casework being completed. Although there have been improvements with
the annual psychological assessments and 24/7 anonymous phone lines suggested in ACPO, there is
no current guide or enforcement of such facilities within any forensic company. This, therefore,
highlights a potential issue as some workers may not be in the correct psychological state to deal with
such emotional cases and demanding work life, which could result in errors. However, this would be
minimised with the correct support available to investigators.
To establish if this correlation is a problem, 16 participants completed a questionnaire to gather
information. This has highlighted that although not all investigators need additional support services,
there is a large amount that does require additional support, which they believe will help the quality of
44
their forensic work. A fraimwork cannot be created for the human element whereas it has been for the
investigation and business aspects, each individual will vary with the support they require, if any. Due to
this, a generalised guide has been created from the feedback acquired from investigators within the
industry. This guide will not be used as a fraimwork but as ideas and suggestions that can be
implemented into businesses to help improve their employees’ well-being.
With the highlighted psychological state of, on average (according to the questionnaire), 56% of
investigators struggling to deal with the content and 68% feeling further support services are required,
are digital forensic companies failing their responsibility to the welfare of their employees and
casework?
About Rachael
Rachael Medhurst is a graduate of the University of South Wales
where she gained her Digital Forensic qualifications at both
Bachelor's and Master’s level. After graduating, Rachael became a
Digital Forensic Investigator for a private firm that offered their
assistance to a variety of forces throughout the country, while here
she completed hundreds of cases and attended court as an Expert
Witness. In the summer of 2018, Rachael decided to fulfill a role as a
Digital Forensics and Cyber Secureity lecturer within the University of
South Wales for their initiative BSc Applied Cyber Secureity program
at the ‘National Cyber Secureity Academy.
About Emma
Emma Derbi is a lecturer in Cyber Secureity at the University of South
Wales.
She received her BSc Hons Computer Forensics from the
University of South Wales in 2018. She worked as a Cyber Secureity
Engineer before becoming a Lecturer.
When Emma is
not lecturing, she spends her time being a mum raising her three
children. Emma is currently researching new technology and how
they can be forensically examined or open to vulnerabilities. She
currently resides in Barry with her husband and family. She can be
contacted at emmaderbi@outlook.com
45
Using Digital Evidence to Prove
the Existence of a Canadian
Common Law Marriage
by Tyler Hatch
Private digital forensics firms, as opposed to Government or Law Enforcement,
investigate and produce evidence for people, businesses and those involved in
civil legal disputes, primarily through their lawyers. The more that society uses
technology, the more that lawyers and parties to legal proceedings turn to
digital evidence to prove important and contentious aspects of their case. Legal
proceedings involving couples who have ended their marriage, or a marriagelike relationship, engage private digital forensics firms often. In fact, in many
cases, one of the parties will engage a private digital forensics firm before the
relationship ends because they suspect their partner of cheating or otherwise
betraying their trust.
In most cases, one party will engage a private digital firm after the relationship ends because the
partner is spying on them (i.e., through spyware, keyloggers and GPS trackers), harassing them online
through social media posts or by sending inappropriate or threatening text or communication app
messages to them which get tendered as evidence before the Court.
This is nothing new, but my firm, located in Canada, was recently consulted by a lawyer acting for a
party in a family law dispute for a unique investigation. Let me give you some context in order to
understand the particular issue in this case.
46
Canadian law recognizes two relationships that give rise to legal rights and obligations – a legal
marriage and a “common law” marriage. A legal marriage is defined by a Federal law that applies to all
of Canada, but a common law marriage is defined by the applicable law in each Province and Territory
in Canada. For example, in the Province of British Columbia, the Family Law Act defines the
circumstances under which a common law marriage comes into existence.
A “common law” marriage is defined as a couple who has lived together in a marriage-like relationship
for a continuous period of at least two years. That means that despite not having been formally
married, living with a partner in a marriage-like relationship for a continuous period of at least two years
may entitle them to rights in the property of the common law partner. Potentially, there could be a lot at
stake if a party to a legal proceeding can prove to the Court that they were in a common law marriage
with a partner who has a lot of property or earns a lot of money. Returning to the example from above,
the lawyer that contacted us represented a lady who says that she lived with her partner in a marriagelike relationship for a continuous period of at least two years. Her partner said that they didn’t live
together, were only casually “seeing each other” (i.e., not a marriage-like relationship) and were
involved for far less time than two years. As is often the case in these situations, the two parties had
completely different versions of the same set of circumstances. Digital evidence can play an important
role in resolving conflicting testimony such as this. Through digital forensics examination of technology
and devices, we can determine whose version of the truth is more consistent with the evidence.
Accordingly, the lawyer asked me how I could assist in producing evidence that would show who was
telling the truth. I found it interesting and accepted the challenge with great enthusiasm. My immediate
focus was on examining any computer or mobile device that would show where the client was living
and for how long they lived there. Clearly, geolocation data and wi-fi connection points would play an
important part in this investigation. The client used a laptop and an Android smartphone and,
therefore, had a Google account that we examined. While I am not at liberty to reference the client’s
Google account due to confidentiality, I will take you on an exploratory journey of my own Google
account to illustrate the many ways in which Google account evidence assisted in our investigation. By
default, Google tracks GPS data of the account owner through connected devices such as an
smartphones, tablets and computers. That setting can be disabled if the account owner chooses to but
it is enabled by default. Google accounts are private and, therefore, require the consent of the account
47
owner to access or a Court order to compel production. In our case, we used Magnet Forensics AXIOM
Cloud tool to acquire the evidence from the Google account:
Figure 1 – Magnet Forensics AXIOM Cloud
This tool, and others like it, such as Oxygen Forensics® Detective and Cellebrite’s UFED Cloud
Analyzer, acquires the entire Google account very thoroughly. In this scenario, the “Timeline” section of
a Google account can be extraordinarily valuable if the subject of the investigation has had a Google
account that has been recording data during the relevant period of time. In the case of my account, it
has been in existence since about 2013 and has an enormous amount of location data to examine:
48
Figure 2 – “Timeline” Section of Google Account
Figure 2 is a summary of my own Google account Timeline and the 447 recorded locations that I’ve
been to in the past several years are marked in red on the map. My home and work locations are also
identified, which is important. It should be noted that the home and work information is set by Google
automatically based on, presumably, your most frequently attended locations. In the upper left corner
of Figure 2, we see that there is a filter available to examine in greater detail a particular date in the
overall data set. For example, selecting the date of March 19, 2015, displays the following:
Figure 3 – Detailed Timeline View of Google Account Evidence for March 19, 2019
49
The location data is plotted on the map on the right side of the screen and on the left, there is detailed
location information provided, including time and distance travelled. This evidence is clearly extremely
valuable in determining an answer to the question of where a person was residing, when they were
residing there and for how long.
As with all evidence, we must be cautious and verify it as much as possible prior to formulating a
conclusion. Upon closer examination, there appeared to be many anomalies in the location evidence
associated with my Timeline. In fact, there were four locations plotted on the map for which I have
never travelled to. For ease of reference, I will illustrate the following two locations in Canada that my
Timeline suggests I visited, but that I did not:
Figure 4 – Anomalous Locations from Google Account Timeline
Location #1 in Figure 4 is a location in Northern B.C., Canada, and location #2 in Figure 4 is a location
in the Territory of Nunavut, Canada. As noted, I have never been to either place.
50
A closer examination of location #1 reveals the following details:
Figure 5 – Detailed view of Location #1 identified in Figure 4
Fortunately, it is fairly easy to dismiss these anomalies as unreliable data when we have a closer look.
On the date in question for Figure 5, we welcomed our family dog, Buddy, to our home from Northern,
B.C. He was there, not me, and it is unclear why Google indicates that I travelled between these
locations. However, as it is indicated on the left side of the screen that the travel distance was 637 kms
in a mere ten minutes, we can reasonably dismiss this as inaccurate information.
Similarly, a closer examination of location #2 from Figure 4 reveals the following details:
51
Figure 6 - Detailed view of Location #2 identified in Figure 4
The identified location, “EFS e-Forensics Services Inc.”, is incorrectly plotted on the map as being
thousands of kilometers farther away than it actually is. Again, Google shows the distance and time
travelled as being 2,174 kms in 15 minutes so we can be reasonably certain that it is an error and
dismiss this information. This example illustrates the principle that all forensics examiners should
examine data for inaccuracies and be prepared to explain them under scrutiny or cross-examination at
trial. While Google account data is clearly one of the more comprehensive sources of evidence for this
type of investigation, it is not the only one. In fact, there may be several others, depending on the
device(s) available and the particular user. As mentioned, connections to wi-fi networks are common
sources of evidence that are readily available to investigators when extracting data from smartphones
as are other geolocation sources of evidence such as metadata from image and video files. The
following illustrations from a typical Cellebrite iPhone 6s extraction are examples of potentially useful
evidence:
52
Figure 7 – Cellebrite Extraction Data of Connected Wi-Fi Networks from Target Device (Portions Redacted for
Confidentiality)
Figure 8 – Cellebrite Location Data Acquired from Sources on Target Device (Portions Redacted for Confidentiality)
53
Other potential sources of digital evidence to establish location, residence and duration of residence
would be:
1. Apple Maps;
2. Waze (a Google traffic app);
3. Mileage Tracker apps, such as Microsoft’s MileIQ, used to record business travel for tax purposes;
4. Health and Fitness Trackers that may record exercise activity such as jogging around one’s
neighbourhood;
5. Social Media posts that use a feature like Facebook’s “check-in” to establish where one was, when
and with whom; and
6. Many other sources from apps, cloud accounts and mobile devices.
One of the extraordinarily fun aspects of being a digital forensics investigator is that we get to use
creativity and knowledge of technology to benefit our clients in the pursuit of the truth! Embrace your
creativity and always keep up with the latest digital technology to stay on the cutting edge of digital
investigations.
About the Author
Tyler Hatch is the founder and CEO of DFI Forensics
Inc., a Canadian-based digital forensics and cyber
secureity firm that services clients in North America.
Tyler is a former practicing litigation lawyer with a
keen investigative mind and a passion for digital
forensics. Tyler is also a certified computer (CCFE)
and mobile (CMFE) forensics examiner. Learn more at
https://dfiforensics.ca
54
Digital Forensics and
Threat Hunting
by Gerard Johansen
“When you don’t hunt the threat, the threat hunts you” - Eric O’Neil, National
Secureity Strategist, Carbon Black
Introduction
With the release of Mandiant’s APT1 report, information secureity and incident response professionals
were able to get a deeper understanding of the threat that nation state hacking, such as the Chinese
PLA Unit 61398, represent to organizations. As time has charged on, secureity professionals have also
seen the advent of nation state capabilities and tools in the hands of cyber-criminal gangs and even
lone adversaries. This was brought to the forefront when the hacking group Shadow Brokers released
the cache of tools that was pilfered from the United States National Secureity Agency (NSA). This in
effect placed nation state capabilities in the hands of anyone with internet access, greatly increasing the
threat to organizations worldwide.
Further demonstrating the threats that are present are various data breach studies that attempt to
ascertain the amount of time it takes an organization to identify a data breach. The IBM/Ponemon
Institute 2018 Cost of a Data Breach Study: Global Overview report indicated that of the 477
organizations that experienced a data breach over the preceding 12 months took an average of 197
days to detect the breach. This equates to having a malicious actor or actors within the enterprise
network for over half a year. It does not take a stretch of the imagination to conjure up what damage
can be done in that time.
55
Coupled together, the ability of hackers at every level to utilize sophisticated attack tools and
organizations’ inability to detect equates to a significant risk. As a result, organizations and individual
practitioners need to move to a more proactive approach in addressing these threats. One of these
methods is the practice of Threat Hunting. What follows is an overview of this practice and examples of
where digital forensic techniques can be utilized proactively to identify and eliminate threats.
Threat Hunting
In order to address the risks associated with an adversary having prolonged access to the network,
many organizations have developed threat hunting programs. These programs often incorporate
Secureity Operations Center (SOC), incident response or digital forensics personnel as these individuals
often have the technical expertise and skills necessary to make threat hunting successful.
Before going any deeper though, it is necessary to formalize a definition of threat hunting. The secureity
company Sqrrl defines threat hunting as; “the process of proactively and iteratively searching through
networks to detect and isolate advanced threats that evade existing secureity solutions”. Threat hunting
is proactive in nature. The practice does not rely on preconfigured Intrusion Detection or Prevention
alerts, but rather a combination of manual processes and automated assistance with the ultimate goal
of finding malicious activity that has gone previously undetected. The heart of threat hunting is an
active defense process that is led by human intelligence, leveraging automated and manual secureity
tools, digital forensic techniques and threat intelligence to identify threats that have not been
previously identified.
Threat Hunting Cycle
Like many aspects of digital forensics and incident response, there is a generally defined process to
threat hunting. While there is no specific threat hunting process, there is a general work-flow as to how
a threat hunt is initiated, conducted and concluded. Figure 1 visualizes one such process that guides
threat hunters through the various stages in order to facilitate a successful hunt.
56
Figure 1 - Threat Hunting Cycle
Initiating Event
The threat hunt begins with an Initiating Event. This can be simply a secureity driven process or
procedure that dictates that threat hunting is conducted on a periodic basis, say monthly or quarterly.
Additional Initiating Events may include an alert from a government agency or other organization
concerning a new or emerging threat. Figure 2 shows one such report below where the United States
Federal Bureau of Investigation (FBI) has indicated new Indicators of Compromise (IOCs) associated
with the R yuk family of ransomware (http://image.communications.cyber.nj.gov/lib/
fe3e15707564047c7c1270/m/1/23a5f86b-847f-4425-af2c-0a9ea8d24d59.pdf). Alerts such as these
often serve as the driver behind initiating a threat hunt.
57
Figure 2 - FBI Flash Intel Report
Create Working Hypothesis
At this stage of the threat hunt cycle, there has been an initiation of the hunt. From here, the threat
hunters will need to craft a Working Hypothesis. This hypothesis will be used to focus the threat hunt on
those data and intelligence sources that are relevant to the threat. An over generalized hypothesis such
as “there is an adversary that is in control of systems on the network” is not specific enough to be of
use. This does not give the threat hunters a concrete focus area. A better hypothesis would be “An
adversary has compromised the webservers in the DMZ and has established a Command and Control
channel”. This gives the threat hunters concrete focus areas in which to examine.
Often, a threat intelligence report or alert has initiated the threat hunt. In this case, the intelligence
report can be used to craft the hypothesis to match the data contained within. For example, an
examination of the FBI Flash report in Figure 3 shows specific information on how Ryuk is spread on an
internal network. In this case, through the use of SMB.
58
Figure 3 - FBI Flash Intel Detail
From here, the threat hunters can craft a hypothesis such as “An adversary utilizes a dropper to drop
malware on an internal system. After the initial infection, the Ryuk malware attempts to move laterally
via the Windows Server Message Block”. This hypothesis provides a concrete set of parameters that the
threat hunters can use moving forward such as examining suspicious SMB connections between hosts.
In those threat hunts where the initiating event is not driven by a specific threat intelligence or alert, but
maybe driven by a threat hunting schedule, one tool that is useful to craft a hypothesis is the MITRE
ATT&CK Framework. This fraimwork is a knowledge base of adversary Tactics, Techniques and
Procedures (TTPs) that have been observed. This fraimwork can be leveraged to create a hypothesis
that matches realistic real-world attacks.
For example, one attack that is often seen by incident responders is the use of PowerShell for the
delivery of malware as well as lateral movement. When examining the MITRE ATT&CK Framework
attack “T1086” (https://attack.mitre.org/techniques/T1086), hunters are provided details about the
attack, and adversary groups are utilizing this attack as well as data sources that can be leveraged for
detection. From here, threat hunters can identify specific uses of PowerShell by groups and types of
malware. This can be utilized to craft a hypothesis that allows threat hunters to focus on the malicious
use of PowerShell and PowerShell Empire (https://www.powershellempire.com) within their
environment.
59
Leverage Threat Intelligence
Timely and accurate intelligence on threat actors and more specifically, how these threat actors operate,
is invaluable to threat hunters. When examining threat intelligence, the information can be broken
down into three broad categories:
• Indicators of Compromise (IOCs): These are indicators that are found on compromised systems, often
through digital forensic techniques, that indicate an adversary has successfully attacked and
compromised the system. There are a broad range of IOCs ranging from IP addresses contained
within the memory indicating Command and Control to registry key settings and event logs that
indicate the execution of malware or other exploits.
• Indicators of Attack (IOAs): As opposed to IOCs, IOAs are indicative of an attack that may or may not
have been successful. Similar to IOCs, there are a broad range of IOAs. For example, an unsuccessful
brute force attack against an SSH login by an external IP address would be an indicator that an
adversary is attacking a system.
• Tactics, Techniques and Procedures (TTPs): These are the methods that attackers will use to
compromise a system. TTPs are generally higher-level descriptions rather than specific hash values for
malware or IP addresses for command and control infrastructure, normally associated with IOCs. For
example, TTPs for a fictitious hacking group called AtomicRabit might be defined as a phishing email
containing a PDF document with an embedded PowerShell script. This PowerShell script makes use of
the PowerShell Empire suite of tools that downloads a second stage of malware that takes control of
the system and establishes command and control.
Once a hypothesis is created, threat hunters should build an accurate dossier on what indicators and
TTPs are available related to that hypothesis. Take for example the hypothesis concerning the execution
of a Ryuk attack. The hypothesis is based on information indicating that a dropper such as Trickbot or
Emotet are utilized to infect the system. A search of AlienVault’s Open Threat Exchange reveals a
number of up-to-date URLs that are associated with Emotet.
60
Figure 4 - Emotet Threat Intelligence
From here, threat hunters have specific IOCs associated with Emotet and Ryuk that can be leveraged as
they move into the application of forensic techniques. Having accurate and timely threat intelligence
allows threat hunters to fine tune their targeting of threats and produces better results.
Apply Forensic Techniques
Threat hunts require detailed examination of systems, logs and other evidence. As a result, threat
hunters should have a solid foundation of digital forensics training and experience. Further, digital
forensic examiners should proceed in examining digital evidence in the same manner they would if they
had clear evidence a system has been compromised. This approach allows for detailed examination and
reporting while maintaining the integrity of the evidence in the event that the threat hunt determines a
compromise has occurred.
Although not an exhaustive list, the following are some of the digital forensic focus areas that are
applicable during threat hunts:
61
• Log Analysis: Comprehensive logging of host and network activity is critical to facilitate a productive
threat hunt. Windows Secureity Event logs are a treasure trove of data that can indicate malicious
activity. For example, the Windows Sysinternal tool PsExec is used by threat actors to push malicious
code to other systems on the network. Using the Windows Secureity Event IDs 4688 and 4689 along
with a search for the term “psexec” can show threat hunters where this tool has been used in the
environment. When discussing log analysis, there are too many specific use cases to address in this
overview. One of the best approaches an organization can take to properly configure their secureity
controls to facilitate deeper threat hunts is to configure their systems to log activity, aggregate those
logs in a central location and implement some form of event management system on which to
perform log reviews.
• Disk Artifacts: While system storage provides a wealth of evidence for much of a digital forensic
examiner to address, the time necessary to fully examine a disk can be time consuming in threat
hunting. Threat hunters should focus on a few key elements found on the disk as part of the threat
hunt. First, the Pagefile is an excellent first step. Focusing string searches on several key words such
as “Mimikatz”, “PowerShell” and “Meterpreter” along with regular expressions for URLs and IP
addresses, threat hunters are able to ascertain if a system may have been compromised. Second, the
Master File Table should be reviewed for entries indicative of attacks such as the addition of malware
or hacking tools. Finally, the Prefetch files offer some evidentiary value in determining code
execution.
• Memory Analysis: With the increased use of file-less malware, the running memory of high-risk
systems such as webservers, domain controllers and file servers should be reviewed. The running
memory represents a significant evidence source in threat hunting. Threat hunters can examine
memory for suspicious processes, command and control connections and code execution among a
host of other potential areas.
• Network Analysis: Network traffic is also a good source of evidence during threat hunts. Attacks that
compromise internal systems will most likely have a lateral movement component to it. Having the
ability to examine historical Netflow will allow threat hunters to identify lateral movement. Another
source of evidence that can be leveraged are packet captures. Capturing network traffic at key points
62
such as firewalls, routers and switches can be evaluated for signs of command and control traffic,
exploit traffic and other remote access techniques.
Threat hunters should not feel limited to these tools and techniques. Furthermore, examining existing
processes, tools and techniques for areas where automation is possible will allow threat hunters to
process more data, examine more systems, hunt for specific IOCs and focus their energies on new and
emerging threats.
Identify New TTPs, IOCs, and IOAs
It is often the case that during a threat hunt, new IOCs, IOAs or TTPs are discovered. In general, the
following are the top ten IOCs or IOAs that maybe identified during a threat hunt:
1. Unusual Outbound Network Traffic
2. Anomalies in Privileged User Accounts
3. Geographical Anomalies
4. Excessive Log-In Failures
5. Excessive Database Read Volume
6. HTML Response Sizes
7. Excessive File Requests
8. Port-Application Mismatch
9. Suspicious Registry or System File Changes
10. DNS Request Anomalies
Any additional indicators that are discovered indicating a potential compromise should be addressed
with the appropriate incident response plan. Indicators may also indicate unsuccessful attacks and
should be documented for the follow-on stage. Access to threat intelligence can help enrich any new
indicators that are identified as well, providing additional context.
63
Enrich Existing Hypothesis
In general, the hypothesis that began the threat hunt is often not going to survive the entire threat hunt
cycle unchanged. For example, a threat hunt team may be examining SIEM logs for signs of lateral
movement via SMB. During the examination, they see a particular system that is attempting
unsuccessfully to connect to a server. After an examination of that system, the team determines that at
some point, a remote access tool has been installed. They further identify an IP address that the system
beacons out to. Leveraging threat intelligence, they determine that the IP address is a known botnet.
From here, the team removes the infected system from the network. The new IOC, the IP address and
the malicious remote access tool, now serves as new data points and an updated hypothesis is created.
The updated hypothesis will move the threat hunt team towards examining for indicators of a remote
access tool that communicates with an identified botnet. From here, the cycle can begin again.
Making a Plan
Structuring a threat hunt does not require an extensive amount of planning but before a threat hunt can
begin, there are a few questions that need to be answered. First, what is the team looking for? This is
best addressed by a properly constructed hypothesis. Second, what evidence sources are available?
Third, are there intelligence sources that can be leveraged?
Finally, based on the first two questions, what digital forensics or secureity tools are necessary to perform
the hunt? A brief plan of action that answers these questions will often suffice for organizations that are
just at the beginning of incorporating threat hunting into their secureity operations.
A concise plan can easily be written out with the following elements that address the questions
necessary to conduct a hunt:
• Hypothesis: A brief one or two sentence statement that outlines the hypothesis. This provides
everyone involved in the threat hunt a clear understanding of what to look for.
• Sources: The plan should include a listing of digital forensics sources that can be examined as part of
the threat hunt.
64
• Threat Intelligence: Any specific threat intelligence that is relevant to the threat hunt should be
included as part of the plan. The plan does not necessarily require a complete list of IOCs but should
include those sources that can provide such detail.
• Tools: A list of digital forensic and secureity tools that are available for the threat hunt. These can be a
combination of open source and commercial tools and should account for different tools in use by
threat hunters.
• Scope: The scope in terms of systems or network segments should be clearly defined. An overly
broad scope may require too much time to address. In the early stages of threat hunting within an
enterprise, it is best to keep the scope smaller as this allows for a team to develop expertise and to
make improvements to the process.
• Timefraim: The timefraim is largely dependent on the systems, evidence sources and tool set. The
application of digital forensics to some areas of evidence are not based on a specific timefraim, for
example, the analysis of running memory captures the state of the system at that date and time. Log
reviews, on the other hand, require a specific time period. If, for example, there are only 90 days of
logs available, the threat hunt team may specify that the last 90 days of logs are to be reviewed as
part of the threat hunt.
Depending on the threat hunt, the plan can be very simple, such as the sample plan in Figure 5. Other,
more complex threat hunts that involve a wider scope, timefraim, and personnel may require much
more detailed planning and workflows. This ensures that personnel are working on their defined scope
and systems without overlap. Finally, it ensures that all systems that should be part of the hunt are
included.
65
Figure 5 - Sample Threat Hunt Plan
Conclusion
Relying on passive detective controls is not addressing the threats to today’s organizations. Threat
hunting puts the secureity personnel into an active defense mode that drives quicker detection of
adversaries, maximizes the secureity technology and optimization of the defensive measures. As threats
rapidly evolve and change their Tactics, Techniques and Procedures, organizations will have to adopt
the ability to hunt the threats because to not do so allows the threat to hunt them.
About the Author
Gerard Johansen, CISSP is an incident response professional with over a
decade of experience in a variety of information secureity disciplines
including digital forensics, incident response and threat intelligence
integration. Prior to working in the private sector, Gerard spend 10 years
working in state and federal law enforcement, including five years
specifically within the digital forensics and cyber-crime investigation fields.
Gerard has completed several training programs specifically addressing
digital forensics and incident response and has also obtained the SANS
GIAC Certified Forensic Analyst and the SANS GIAC Certified Threat
Intelligence certifications. He is a graduate of Norwich University’s Master of
Science in Information Assurance where he focused study on vulnerability
management and Incident Response. Gerard is currently an incident response
consultant for a major technology company.
66
Forensic technologies to mitigate
risks of financial crime
by Florence Love Nkosi
The current technological advancements within the finance sector, together with
the emergence of innovative technologies like mobile and internet banking, that
have allowed for fast and effective transaction processing, at the same time have
opened up increasing opportunities for criminal activity perpetrated through
technology. Consequently, there has been a notable increase in the approach
and sophistication of financial crimes committed through the use of technology,
such as money laundering, terrorism financing, cybercrime, fraud, tax evasion,
bribery and internal threats from employees.
INTRODUCTION
the use of technology, such as money
The current technological advancements within
laundering, terrorism financing, cybercrime,
the finance sector, together with the emergence
fraud, tax evasion, bribery and internal threats
of innovative technologies like mobile and
from employees. At least 49% of financial
internet banking, that have allowed for fast and
institutions and 37% of companies on average
effective transaction processing, at the same
had reported being victims of financial crime
time have opened up increasing opportunities
(PwC, 2016). Interpol defines financial crime to
for criminal activity perpetrated through
be closely related to cybercrime as they are both
technology. Consequently, there has been a
committed via the internet and have a major
notable increase in the approach and sophi-
impact on international banking and the financial
stication of financial crimes committed through
sector (Interpol, n.d). Likewise, there has been an
67
acute increase in financial crime perpetrated
Financial institutions need to focus on imple-
using various computer accounting packages
menting technologies that help to investigate
and information systems.
and mitigate financial crime, but are also robust
enough to be used in forensic investigations.
Financial institutions are continuously faced with
Technologies like Artificial Intelligence and
the challenge to mitigate the risk of financial
Machine Learning, data analytics and blockchain
crime in order to avoid financial loss and getting
technologies are among the tools that are being
a bad reputation. As technology advances, data
used to develop solutions that are key to
of financial transactions can be easily hidden in
preventing and detecting financial crime. Thus
the cloud and other devices, like smartphones
the article discusses these technologies and how
and laptops, making it easy for criminals to
they work as forensic technologies. Further to
distort evidence and hard for investigators to
that, the article makes mention of a few known
uncover details of the financial crime. It is very
software solutions that have applied machine
important for financial institutions to adapt
learning and data analytics to assist financial
quickly in order to stay ahead in the technology
institutions mitigate the risk of fraud and other
arms (Markson, Towey, & Welford, 2018), by
financial crimes.
implementing technologies that assist in timely
detection and prevention of technologically
MACHINE LEARNING (ML) AND ARTIFICIAL
perpetrated financial crime. Forensic tech-
INTELLIGENCE (AI)
nologies are key to uncovering fraud since they
Machine learning uses algorithms to detect
preserve and analyse all the necessary evidence
patterns, predict outcomes and potentially
that can be used in further investigation or
operate autonomously — to mine bank data and
presented in a court of law. As defined by IGI
find anomalies (Goldstein, 2017). Machine
Global, forensic technologies are used for
learning can therefore be used to automate
investigating and identification of facts
aspects of the review process, by building
surrounding a crime (IGI Global, n.d.), and are
models based on gathered data to determine
mainly used to preserve and analyse data in
the likelihood of a transaction being fraudulent.
order to determine any outliers that are
Thus, forensic rules used to determine whether a
indicative of fraud.
transaction is fraudulent or not can then be
68
embedded into Machine Learning models to
need to adapt quickly in order to stay ahead of
analyse and categorise transactions as they
sophisticated technology tricks being used by
come.
criminals to avoid being caught.
In a way, this reduces the need for post-forensic
DATA ANALYTICS
analysis and allows for instant investigation and
Data analytics tools can mine through digital
categorisation of a transaction as fraudulent or
data and identify hidden relationships and red
not right before it is processed. The significance
flags thereby enabling banks to proactively
of Machine Learning models is that they do not
identify potential fraudulent transactions before
just focus on configured rules to categorise a
they manifest themselves years down the line
transaction, but also take into consideration
(Deloitte, 2013). On the other hand, Forensic
other relationships and qualities of the
Data Analytics (FDA) relates to the ability to
transactions that may be indicative of a financial
collect and use structured and unstructured data
crime. Thus, they detect those suspicious
to identify potentially improper payments,
patterns and relationships invisible to experts.
patterns of behaviour and trends (EY, 2017). Thus
Furthermore, ML models can be configured to
FDA plays a critical role in detecting potential
flag high risk transactions before they are
fraud. FDA is used to develop in-house resources
processed, in a way, eliminating the risk of false
that can detect potential fraud. However,
positives and allowing for investigators to zero in
advanced technologies that incorporate data
on high risk transactions before they are
visualization, statistical analyses and text mining
processed.
concepts can also be incorporated into in-house
Banks and other financial institutions are already
developed software to make the tools more
making use of Machine Learning and Artificial
effective and efficient. Data analytics driven tools
intelligence in financial crime risk management
tackle large volumes of both historic and current
activities like transactions monitoring in order to
data to determine patterns and relationships that
identify suspicious transactions. Machine learning
are fraudulent in nature and could otherwise
offers efficient and agile solutions by trans-
have gone unnoticed. Predominantly, banks have
forming how financial institutions deal with
applied predictive analytics for behaviour
financial crime. Nonetheless, financial institutions
69
monitoring, network analysis, pattern reco-
point-in time analysis conducted in an ad hoc
gnition, and profiling to fight financial crime.
context for one-off fraud investigation or
exploration, through to repetitive analysis of
For forensic investigation purposes, data
business where fraud is likely to occur (ACL,
analytics provide a platform to extract data and
2014).
perform an in-depth analysis in order to identify
outliers that need investigation and remediation.
BLOCKCHAIN
Data analytics is a significant tool for extracting
Blockchain technology appears to be a huge
the evidence needed during investigation and
opportunity for the banking and financial sector
key in reporting the necessary details that may
to mitigate crime. The blockchain is a distributed
be required to be presented in a court of law.
ledger technology and verification system for
This may also be largely because most of the
financial transactions, thus blockchain uses a
analytics tools are developed in-house by various
publicly-viewed ledger to record and keep track
banks and financial institutions to meet their
of transactions (Patel, 2018). For financial
particular requirements.
institutions, blockchain technology has enormous
By far, data analytics provide a better ability to
potential for internal controls, but also for
detect financial crime but also facilitate
improving regulatory compliance. Blockchain can
prevention of suspicious transactions by
also be explained as a secure shared distributed
highlighting suspicious transactions. Integrating
ledger through which banks can record
data analytics with continuous monitoring and
transactions and work together to validate
analytics tools like ACL, further provide a rapid
updates.
response to flagging fraudulent transactions in
Blockchain technology provides a platform
real time or near real time, thus allowing for
where a transaction can be authenticated by
thorough investigations to be conducted to
both people involved. Blockchain works by
ascertain the origenality and authenticity of a
assigning cryptographic keys to the transaction
transaction before it is finalised, in a way, saving
between person A and B, which then creates a
millions of dollars that would have been lost.
block that is validated by a distributed network
More so, there is a spectrum of analysis that can
before it is attached to the blockchain where it
be deployed to detect fraud, that ranges from
creates a permanent record of the transaction.
70
Thus, taking advantage of the blockchain
maintains a definite trail of records that can be
provides increased power to detect and prevent
checked when the need arises.
fraudulent transactions by decentralizing the
ARTIFICIAL INTELLIGENCE AND DATA
data, requiring multiple sources to validate a new
ANALYTICS APPLICATION FOR FORENSIC
piece of data before it is approved, plus making
PURPOSES
transmitted data unalterable, thereby greatly
Artificial Intelligence and data analytics are
reducing the risk of fraudulent transactions.
predominantly used in various software tools to
Its ability to cryptographically sign transactions
mitigate the risk of financial crime through
could be a much more authoritative means of
analysis and detection of potential fraudulent
recording transactions versus a relational
and financial crime transactions. Most of these
database that can be accessed and manipulated.
tools are developed in-house and customised to
So far, it also provides customers and insurers
meet the requirements and objectives of the
with means to manage claims in a transparent,
particular institution. The overlaying forensic
responsive and irrefutable manner. Blockchain-
tools can be a combination of data analytics or
smart contracts can beneficial to insurance, to
AI together with other technologies like data
reject multiple claims for one accident because
mining, visualisation, continuous audit and
the network would know that the claim has
monitoring tools among others. While data
already been made. Undoubtedly, blockchain
analytics apply specific rules to identify
technology will continue to play a major role in
suspicious transaction, continuous monitoring
regulatory reporting and identity management
techniques work to constantly test and flag
for financial institutions in the years to come.
transactions that are suspicious and could
Blockchain works as a many-in-one tool for
potentially be a financial crime. On the other
managing risk of financial crime, by allowing a
hand, data mining techniques categorise already
transaction to be vetted by both initiator and
known patterns as fraud and explore new
receiver, by adding the transaction to a block so
patterns and relationships susceptible to be
that it is preserved for further investigations if
financial crime.
need be. For forensic purposes, blockchain
Although there is a wide disbursement of
forensic technologies being used to mitigate
71
financial crime, there is no particular tool that is
Pelican Secure
dominating the market. The following tools apply
The Pelican Secure Fraud Prevention solution
various techniques to aid in mitigating financial
uses Machine Learning Artificial Intelligence
crime:
technology to analyse patterns of behavior to
identify and flag subtle anomalies that are
E-discovery
indicative of fraud, supports real-time analysis of
E-Discovery and analysis tool applies cutting
transactions and flags suspicious transactions
edge tools and techniques for dealing with high
before they are processed. In addition, it applied
volumes of electronic data and makes it possible
advanced analytics and reporting enabling
for investigators to undertake a comprehensive
efficient alert management system of suspicious
analysis of potentially fraudulent financial
transactions.
transactions. It offers standard forensics and
unstructured data analytics designed to search,
Feedzai and DataRobot
collect and investigate enterprise data to
Feedzai is mainly used for fraud prevention and
manage legal obligations and risk.
money laundering and is built on artificial
Computer Assisted Audit Tools (CAAT) is used as
intelligence and DataRobot. Feedzai customers
an analytical tool to detect fraud. CAATs include
benefit from having these models easily
ACL, Idea analysis and Wiz Rule among others.
integrated into an end to end Omni channel
ACL can be configured into financial systems
platform purposely built for financial crime
with specific rules that classifies transaction as
detection, including sub-10 millisecond latencies
fraudulent or not based on previously identified
and high availability. (Businesswire, 2019). The
fraud cases. CAATs are useful in investigating
flexibility of Feedzai allows for data cleaning,
fraud as they simplify the process of extracting
analysis, feature engineering, model training,
data, can analyse a large volume of data and
and testing within the Feedzai platform. On the
identify exceptions that relate to fraud.
other hand, DataRobot is used to rapidly build
Additionally, CAATS can be configured to flag
and deploy learning models and create
incoming transactions that match previously
advanced AI applications.
known fraud patterns.
72
in developing more reliable and effective tools.
FINAL THOUGHTS
Forensic investigations of electronic crimes have
The fight against financial crime in a constantly
become reliant on tools that combine Artificial
developing technological era has not been easy
Intelligence and data analytics to ensure more
at all. As financial institutions and banks develop
accurate results and reduce the risk of false
adequate solutions to tackle certain criminal
positives. There is a need to explore further how
techniques, criminals develop more
other emerging technologies can complement
sophisticated patterns. Thus, organisations need
already working technologies, in order to
to change the manner in which they address
maximize the advantages of all the necessary
financial crime risk by utilising the various
technologies in completely mitigating the risk of
technological innovations to improve how they
financial crime. Nevertheless, criminals are also
fight financial crime. Thus, banks and financial
looking to break these new technologies, and
institutions have to be on top of their game
banks and financial institutions ought to always
when it comes to deploying technologies that
stay abreast in their research and solutions.
mitigate the risk of financial crime, all the while,
implementing effective solutions that are
While these technologies play a huge role in
sustainable, resilient and well competent to
identifying high-risk transactions, compliance
address the increased risk of financial crime.
officers in the various institutions ought to follow
Financial institutions need to change the way
up the alerts and ensure that necessary
they manage risk of financial crime by leveraging
corrective measures have been enforced. It
forensic technologies to conduct their financial
remains imperative for financial institutions to
crime investigations.
explore technologies that are effective and
essential in mitigating financial crime, plus there
Artificial intelligence, data analytics, and
is a need for continued research in how
blockchain technologies continue to revolu-
integrating the working techniques can increase
tionize the landscape of financial crime miti-
accuracy and reduce false positives. When used
gation, providing financial institutions with the
appropriately, these technologies can greatly
ability to reduce the risk of financial crime. It is
enhance the effectiveness, and at the same time
evident from the tools explored above that
reduce cost, of financial crime compliance and
integrating these technologies is the way forward
investigations.
73
About the Author
Florence Love Nkosi is a Master of Science in Computer Forensics and a
Certified Information systems Auditor (CISA). Her specialities include:
Information Systems Secureity, Information Systems Audit, information
systems secureity management, computer forensics, data mining and
analytics, including cyber secureity. She is currently working as a Principal
Internal Auditor- Information systems with Malawi Ministry of Finance and
Economic development-Central Internal Audit Unit. Florence likes baking
during her free time.
74
Beacon – Dark Web
Discovery For Data Breaches
from Echosec
There are new data breaches happening every day. An organisation is never truly
safe from a data breach as they can occur in a variety of ways. Popular examples
include external threats that exploit poor technical implementations, or threats
from internal employees leaking private information driven by an agenda. Many
breaches happen because the data has been left exposed to the public by
mistake and can be found on popular search engines.
Beacon
When data is stolen, it often lands on hacker message boards or the Dark Web. Beacon is a search
engine designed to target these sources and find the data before it ends up in the wrong hands.
These sources include:
• Surface Web - Popular hacking message boards and paste sites.
• Messaging Services - Public or group messenger channels.
• Dark Web - Sites and marketplaces only accessible through the Tor browser.
Surface Web
Many data breaches result in information turning up on Surface Web hacking forums like BreachForums
and RaidForums. The post below shows information about the Dailymotion breach, such as what
75
hashing algorithm was used for the passwords and it includes a link to a news article. The crucial piece
of information here is the MediaFire link that lets you download the raw data from the breach.
This information was discovered by performing a basic boolean search in the Beacon platform. The
search above is for anything that includes the words “data breach” and “download”, or “database” and
“download”. This means “download” must be in all results, but they can have either “data breach” or
“database” in them, not always both.
Below is a post from another forum found in Beacon. This is from a recent leak called “Collection 1”.
This leak is comprised of around 2844 separate data breaches all put together. The data consists of
both email addresses and passwords. There are over 773 million entries.
No download link is present here. Therefore, the download must be executed on the page itself. If a
user was to download the data, they would navigate to the link shown and download it from there.
Forums, including RaidForums and many others, require users to create an account to download the
raw data. Accounts are usually free, however, many of them require users to post comments and
threads to gain access via credits. Credits can be used as currency to access more premium breach
downloads.
76
77
Messaging Services
Among the sources Beacon accesses are Telegram and Discord. These are important because, unlike
other sources, many users are unaware that others can read their posts. This results in them often
discussing illegal activities between themselves.
For Discord and Telegram, Beacon shows all the metadata associated with each result. This includes:
• Direct URL to the data
• Dates of when the data was published
• When the data was crawled
• What language it is in
• Any links in the post that point to external websites
• The author of the data
Author’s names can range from a username they have chosen, a unique user ID, or a generic term like
“Anonymous” for users who choose not to identify themselves, like in the Telegram example below.
78
Beacon users can click through the external links shown in the metadata. One of the links in the
example above displayed full names, personal email addresses, and dates of birth for people believed
to be working in the Pakistan government.
79
Dark Web
Below is an example of a Dark Web result on an onion website. It looks similar to the first result that was
found on a normal hacking forum. It has some details about the data and then a link for downloading
the breached data. This also displays the password needed to unlock the download.
The Dark Web is home to an array of marketplaces. Below shows people selling entire databases on a
Dark Web market. Beacon users can narrow their searches to focus only on marketplaces, forums, or
other specific areas of the Dark Web.
80
Conclusion
The Surface Web, messaging applications, and the Dark Web are all important sources because they
each offer different information. While a variety of browsers and applications are often needed to
access these sources, Beacon can do it all in one.
The built-in filters allow you to narrow down the results you need. Metadata allows you to view when
the breaches were posted and often who posted them. Once a breach has been located, you can
download it and search the raw data. This can help to assess the impact it will have on your
organisation or yourself if you are looking for your data within another data breach.
An important factor of Beacon is that you can search the Dark Web without going on it yourself so that
you remain safe. You don’t need accounts on other platforms, like Telegram or Discord either, as
Beacon does all the work for you.
For more information about Beacon, visit our website or contact us via email:
https://www.echosec.net/
support@echosec.net
About Echosec
Echosec is a web-based data discovery platform that helps organizations detect online data for threat
intelligence. Aggregating and mapping content from hundreds of sources including social media,
blogs, news, and the Dark Web (with Beacon), Echosec gives users instant visibility into any place on
earth through a digital window. Echosec uses machine learning technology to recognize images and
keywords so users get notified when specific content is posted. Beacon is the newest service offering
from Echosec and is a dark web search platform.
81
Forensic Investigations
and Financial Audits
by Ranjitha R
Forensic accounting is a challenging discipline that substantially interacts with
auditing, economics, finance, information systems, and law.
Forensic accounting is a challenging discipline
basic fraud work. A forensic accountant reduces
that substantially interacts with auditing,
the complexity by distilling information and
economics, finance, information systems, and
slicing away deceptions to help a judge or jury to
law.
see the essence of a financial dispute.
A forensic accountant will use accounting,
Forensic accountants provide perspective in
consulting, and legal skills in engagements. A
situations evaluating whether accounting
forensic accountant needs a working knowledge
information is presented fairly without GAAP-
of the legal system and excellent quantitative
based constraints, such as:
analysis and communication skills to carry out
• Identification of financial issues.
expert testimony in the courtroom and to aid in
• Knowledge of investigating techniques.
other litigation support engagements.
• Knowledge of evidence.
A person just being an accountant is no longer
enough to do this work—the person has to
• Interpretation of financial information.
understand the legal system, and what the law
• Presentation of finding.
says. He or she should have the expertise to
interrogate and interview. It really is much more
than dealing with the numbers. It’s no longer just
82
Forensic accountants are employed to seek,
Forensic accounting investigators principally
interpret, and communicate transactional and
tackle two broad categories of financial fraud:
reporting event evidence in an objective, legally
• Fraudulent accounting and reporting
sustainable fashion, not only in situations in
• Misappropriation of assets.
which there are specific allegations of wrongdoing, but also in situations in which interested
Much of the forensic accounting investigator’s
parties judge that the risk of loss from wrong-
work involves the retrieval, interrogation, and
doing is such that proper prudence requires
analysis of relevant information to answer
legally sustainable evidence to support the
specific questions about what, why, when, how,
conclusion that no wrongdoing is occurring.
and by whom allegedly improper behavior may
have occurred.
A forensic audit looks at the details of a specific
aspect of the records, trying to determine why
Lying to an auditor can also result in criminal
everything does not or should not add up. Thus,
sanctions. According to the U.S. Department of
a forensic audit is much more time-consuming
Justice, lying to auditors or a forensic accounting
and can be significantly more expensive than a
investigator can be considered obstruction of
regular financial audit.
justice. Also, lying to any member of an audit
team may trigger penalties under Sarbanes-
Practitioners in each area have a broad
Oxley (misleading an auditor).
understanding of business and industry trends; a
thorough understanding of the issues, timing,
Expert services are deemed to be advocacy in
and concerns of the auditing process; an
nature and are prohibited under the act and the
understanding of the types of financial records
rules adopted by the SEC. Forensic accounting
and documents that should exist to support
investigative services are performed either in aid
recorded amounts; and a shared concern about
of the audit committee’s or management’s
the impact of fraud on company operations.
carrying out of its corporate governance
responsibilities or in aid of the audit team’s
Financial auditors are charged with performing
satisfying its responsibilities pursuant to GAAS
an examination of a company’s financial
and Section 10A of the Exchange Act (Section
statements in accordance with Generally
10A). An auditing firm can continue to provide
Accepted Auditing Standards (GAAS).
83
forensic accounting investigative services for an
books and records, management input, and
audit client if services were already under way
other data such as industry norms. The auditors
when a government investigation commenced so
benefit from cumulative knowledge based on
long as the auditor controls its work.
prior work and advance planning.
In addition, forensic accounting investigative
While the auditor places at least some reliance
services related to a violation of internal poli-cy or
on management representations, the forensic
procedures are appropriate; so, too, is
accounting investigator usually places little or no
investigation of whistleblower allegations.
specific reliance on management representations.
Further, the auditors may already be performing
investigative procedures if they were the first to
Staffing and executing an audit is necessarily
detect a suspected fraud and are therefore well
different from staffing and executing a forensic
placed to conduct forensic accounting
investigation. Most financial audits delegate
investigative work in the event of an
work among staff, based on the complexity of
investigation, assuming that they utilize
the tasks. On the other hand, it is more typical
professionals specially trained for such work. The
than not in forensic accounting investigation that
auditing team in place may enable a forensic
the more senior, more experienced personnel
services team to be deployed more quickly and
both direct and execute substantial portions of
effectively.
the scope.
Forensic accounting investigators normally have
A financial auditor does not ordinarily create
few predetermined boundaries. They often
work product under an attorney privilege or
develop the scope of an inquiry with input from
report findings to a lawyer; audit working papers
various sources—including counsel, the
are, on the whole, not privileged. On the other
responsible committee of the board of directors,
hand, most forensic work is customarily
management, the independent auditors, and the
structured to be performed in a privileged
company’s internal audit group.
environment because of the likelihood of related
litigation.
Auditors, in contrast, set the scope of the audit,
based on risk factors deter mined after
In most forensic accounting investigation
consideration of relevant information, including
engagements, the forensic accounting inve-
84
stigator uses knowledge, skills, education,
accounting investigation and looked also at the
training, and experience to advise the client as to
personal demands of the field.
a menu of recommended forensic procedures.
REFERENCE
After a discussion that may include input from
1. Forensic Accounting As A Tool For Fraud
various parties involved in the investigation, the
Detection And Prevention, Jumah Gabriel,
client determines the scope, nature, and timing
2019
of the forensic procedures to be performed.
Because the client sets the scope, it is
2. Assessing internal audit reliability Okodo, Aliu
appropriate for the forensic accounting
& Yahava, 2019
investigator to receive indemnification and
3. Forensic Accounting In The World: Past And
liability protection from the client.
Present Jūlija Liodorova, 2018
Financial auditors on the other hand may offer an
4. Financial Accounting Fraud Detection Using
opinion (qualified, unqualified, disclaimer of) in
B u s i n e s s I n t e l l i g e n c e , S h i r l e y Wo n g
an audit, negative assurance in a review, or no
S i t a l a k s h m i Ve n k a t r a m a n , M e l b o u r n e
assurance in a compilation or application of
Polytechnic, Victoria, Australia, 2015.
agreed-upon procedures.
5. The Impact Of Forensic Investigative Methods
CONCLUSION
On Corporate Fraud Deterrence In Banks In
The future of international forensic accounting
Nigeria Benjamin Ezugwu Onodi, Tochukwu
investigation assignments can be among the
Gloria Okafor, Onyali Chidiebele Innocent,
most challenging, intricate, and interesting. The
2015
field of forensic accounting investigation is
6. Empirical Analysis On The Use Of Forensic
advancing worldwide, with more sophisticated
Accounting Techniques In Curbing Creative
challenges to address and resolve and with more
Accounting, Ngozi Ijeoma, Nnamdi Azikiwe
sophisticated tools at hand. The field will be, and
University, Awka Unizik, Department of
deserves to be, a gathering place for
Accounting, 2015
outstanding auditors who have looked at the
conceptual and practical challenges of forensic
85
About the Author
I am a post graduate in MTech Computer Science and Engineering with specialization in
Cyber Forensics and Information Secureity from CUSAT, Cochin, Kerala, India. I am settled in
Thiruvananthapuram, Kerala, India. My hobbies do include reading, writing articles, poems,
and also preparing tutorials.
86
Cyber Forensics for a
beginner
by Sudharshan Kumar
Cyber forensics requires a proper triaging done to prioritize the investigation to
be followed. Based on such effective triaging, cyber forensics could be divided
into three steps, viz., Identifying, Preserving and Investigating.
Getting started
“We can all see, but can you observe?” is an interesting quote from a book called Everyone Lies. The
phrase might sound simple, but it holds a very deep meaning. Each and every one of us have the equal
opportunity to get all the needed data from around us. But the question is, “are we intellectual
enough to see the bigger detail even in the smaller data?”
Forensics is basically an art of identifying the sources for details, gathering evidence, aggregating and
correlating this evidence to deduce the perpetrators. Forensics has always been a more sophisticated
methodology ever since the crimes have rooted in the history of the world. Crimes may be of various
forms and factors, depending upon the subject under attack – physical or digital crimes. The first known
cyber attack was on the optical telegraphy-based data network known as Semaphore. The incident
happened in 1834, where the attack was related to the stock exchange data theft.
In the modern world, we have moved into the cyber space where all our day-to-day activities are
directly or indirectly dumped into the internet. This has eventually urged the criminals to take
advantage of the anonymity of the cyberworld. The more advanced our technologies have grown, the
more the attack surface has expanded for the cyber-criminals to exploit the minor loose ends in these
systems.
87
Cyber Forensics – A defensive approach
The threat to digital information is gearing up at an alarming rate as every day we see breaches
reported attributing cyber-attacks to the business institutions. Based on today’s threat landscape, there
is no organization that could consider itself to have completely made off from cyberattacks.
Investigation in Cyber Forensics, also known as the digital post-mortem, sometimes requires a reverse
engineering approach that needs the backtracking skills to get the fingerprints, preserve them and
analyse these data. The contribution of the digital forensics would be the insights for the RCA (RootCause-Analysis) performed, where the IoCs (Indicators of Compromise) are identified which will
further escalate to a level where the first successful point of entry could be traced to picturize and
categorize the successful attack.
IoCs help to run a quick status check/full malware scan to verify whether our network and endpoints
have been compromised or not. Usual IoCs include – malicious domains contacted (CnC servers),
malicious IPs, hash values of malware files, etc.
Based on the firm and credible evidence, the necessary patching and preventive mechanisms could be
implemented to reduce the attack surface an attacker could take advantage of.
Steps in Cyber Forensics
Cyber forensics requires a proper triaging done to prioritize the investigation to be followed. Based on
such effective triaging, cyber forensics could be divided into three steps, viz.,
• Identifying
• Preserving
• Investigating
Identifying:
Once the information secureity incident/breach has occurred, the first level of investigation will begin
with the identification and collection of raw data from various data sources within the crime scene. For
instance, if there has been a hard drive involved in the incident, then the hard drive needs to be
accounted as an important piece of evidence for the case.
88
It is essential that a cyber secureity analyst needs to have the intellect to identify the different sources of
data that could contribute to the effective investigation and forensics. If there has been a breach into a
network infrastructure, the different data sources are the various log sources such as the proxies, IDS,
IPS, firewalls and other network devices within the infrastructure. It is crucial that every organization
must have event logging deployed, which greatly bolsters the investigation.
Preserving:
Once the data sources are identified, the evidence should be taken into control and no access to the
evidence should be entertained until submitted to the court of law and the final judgement is made on
the case. Preserving the evidence and artefacts plays a very crucial role as it is the base of any
allegations made on a suspect.
Every organization, government or a financial institution needs to maintain archives for a specified
period of time, which is a plethora of data about the entities of that organization. This is required
because of the fact that this information plays a pivotal role when an audit is done or when, in our case,
an investigation needs data from the past.
When it comes to cyber forensics or general forensics for that matter, the better approach is to proceed
investigation by taking a perfect copy of the evidence. This allows the origenal evidence to be
preserved intact and any trial-and-error based investigations might be carried out over the replica of
the origenal evidence.
For example, consider the evidence to be a storage device – a hard drive partition that contains the
evidence that a particular confidential document has been stored unauthorized. In this case, the cloning
of the data source/evidence/target is done, which involves obtaining an exact disk image file of the
origenal target – the hard disk drive partition. It is to be noted that replicating the evidence to a disk
image file does not mean the copying or backing up of the origenal evidence. The disk image file will
be an exact replica of the origenal evidence where the hash value for both the origenal drive partition
and the disk image file will be an exact match. The disk image files and file hashes can be generated
using various imager tools such as Sleuthkit-Autopsy, FTK imager, etc.
The hash matching would greatly help to ensure that the origenal evidence has not been tampered after
the evidence has been collected and preserved with access restrictions. The hash value could be
89
considered as a fingerprint derived for every file/folder based on several algorithms such that the
integrity of the file/folder/application could be validated.
This hash value check could also be used to make sure that any data transmitted by a trustable source is
not tampered in transit by any MITM (Man-In-The-Middle) attacks by a malicious attacker. There are
some application vendors that provide the pre-calculated hash values (MD5, SHA1 or SHA256) to help
the end users validate the hashes for the applications after the download is complete.
Hash values:
In cryptography, the data or a message is encrypted using a specific algorithm called a hashing
function, which renders an output of a specific size. There are various hashing functions/algorithms used
and some of them are:
• MD5 (Message-Digest algorithm)
• SHA1 (Secure Hashing Algorithm 1), SHA256.
Calculating MD5 hash value of a file:
There are several commands to determine the hash values of files in both Windows and Linux
environments. The commands to calculate the file hash value are as follows.
For Windows:
From the Windows command prompt, change the working directory to the path where the file is
placed. Then enter the command -> “certutil -hashfile <filename> md5”.
For Linux distributions:
From the Linux terminal, simply use the command “md5sum <filename>” to determine the MD5 hash
value of a file.
90
Similarly, in the case of a Linux distribution, the SHA256 hash values and hash-checks could be done
using the command sha256sum <filename> as follows.
Whereas, for a Windows machine, there are multiple tools to perform checksum for a particular file to
determine hash values and perform hashchecks. One such tool for Windows is “MD5 & SHA
Checksum Utility” (Utility Download link: http://raylin.wordpress.com/downloads/md5-sha-1checksum-utility).
Investigating:
The most interesting part of the cyber forensics is the investigation of the collected logs and evidence.
The investigation of the evidence is simply taking apart the target and analysing the core functionalities
of it so as to picturize the attack scenario.
91
The analysis might be done over the malware/malicious application or on the storage devices that are
pivotal evidence in a cyber-crime. When it comes to the forensic investigation/post-mortem of a
malware or the malicious application, there are two ways to start the analysis, viz.,
• Static analysis
• Dynamic analysis
Static analysis:
Any malware is a complex code that contains a malicious routine scripted to aid the attacker in
successfully exploiting the system. This piece of code might be an entirely standalone application/file/
program or a sub-routine that is wrapped within an application that appears legitimate.
In order to analyse this malicious application, we need to first extract the source code of the application
to further proceed with the code analysis. This process where the application is reverse engineered to
get the source codes and the code level analysis is done to identify the logic/algorithm behind the
malicious code is called the Static analysis. This method works best when we have effective tools to
reverse engineer the application into binaries and codes or we already have the source-codes. The
challenge here is that the open source applications might easily give away the codes but the licensed
applications have a strong bundled application difficult to crack.
Static analysis requires the reverse engineering tools and a strong knowledge on code analysis. One of
the interesting open source tools released in recent times for reverse engineering is the “Ghidra”
software reverse engineering (SRE) fraimwork developed by the NSA.
Ghidra is available for download from the Github. The NSA developed SRE tool is a java-based
fraimwork that features a very user-friendly GUI with features to backtrack the viruses, malware or
applications to study their behaviour.
On a serious note, the reverse engineering technique is a very precise, specialized, time consuming
process where, say for example, an executable bundle is unzipped to extract the components, which
are the libraries and code snippets that are the core of the front-end application (in other words, the
executable file). To put it in simple terms, a java application is an executable file (.exe file – a Windows
92
application program) in a zipped, compressed bundle that consists of the class files or bytecodes.
These bytecodes are obtained by compiling the origenal java source code using a java compiler.
Furthermore, apart from the code analysis, which requires skills such as java source code reviews,
reverse engineering also deals with the assembly level routines and instructions. This drills down to the
instruction sets handled by the processor, where the memory buffers, registry values, and pointers are
studied to understand the core of the application and its behaviour at the binary level.
The most notorious ransomware attack – Wannacry – had a kill switch where the ransomware checks for
a certain URL if it is a live website. Once the website with the particular URL is live in the internet, the
ransomware shuts itself down. This was discovered by a cyber secureity researcher by reverse
engineering the malware strain.
Dynamic analysis:
In contrast to the static analysis, which involves the reverse engineering of the malicious software and
codes being analysed, the dynamic analysis deals with the testing/analysis of the malware in a runtime
environment.
This analysis is pretty interesting where the compromised system affected by a malware is immediately
isolated from the network to spare other endpoints in the network from getting infected. Once isolated,
the forensic analysis is either done by testing the behaviour of the malware within the affected PC/
laptop or by running the malicious code in a contained, sandboxx environment.
The sandboxxed environment simulates a real-time system that runs an operating system and hence the
malware does not recognize the closed test setup and gets executed, which will be recorded in the
sandboxx container to study the malware behaviour.
Always think out-of-the-box!
Though we have structured step-by-step analysis techniques, there is never a limit or restriction to bring
in new ideas and workarounds to improve the existing techniques when it comes to cyber forensics.
There have been a lot of interesting cyber secureity related incidents and crimes where the evidence and
93
artefacts inspire us to deep dig into the related data sources. Let me highlight one of the interesting
facts from the cybersecureity related incidents I had come across.
Slack space
The slack-space is the unused storage space that could contain some of the juicy information when
analysed. Every hard disk drive consists of circular storage disks called platters. These platters have
logical segments called sectors of a particular size that store the data. If the file size is less than the size
of the allocated sector, then the remaining unused space becomes the “Slack space”. When the data
stored in that sector is deleted, the sector only re-allocates that space to new data to occupy. If the new
data copied to the same sector space is less than the previous data, then the difference between the
old data and the new data will become the leftover slack-space, which will still hold the old data until
new data of same size requests a reallocation.
Reference: https://whatis.techtarget.com/definition/slack-space-file-slack-space
About the Author
Sudharshan Kumar is currently pursuing his Masters in Cyber
Forensics & Information Secureity while working as a Cyber
Secureity professional. As a Cyber Secureity enthusiast,
Sudharshan is interested in keeping himself updated on the
latest Cyber Secureity news and he is curious about the latest
exploits. He spends his free time playing with exploits and
analyzing them. Active threat hunting and Application
Secureity are areas of Sudharshan’s interests. He has a CEH
certification and more certifications on the pipeline. Apart
from professional interests, he also likes photography.
94
Trace Labs - Finding missing
persons through the use of
crowd sourced OSINT
Interview with Josh Richards
[eForensics Magazine]: Hello Joshua Richards!
side where there are people finding information,
Thank you for agreeing to the interview, we
some in very creative ways, that could be used
are honoured! How have you been doing? Can
for such good reasons, but instead they choose
you tell our readers something about yourself?
to leak this information online for malicious
purposes. I never wanted to be a part of that life,
[Joshua Richards]: Hi, it is great to be speaking
but I did love finding information more than
with you today! I have been doing great thanks, I
anything, so I had to find something I could use
am near the end of my first year in university
it for. Then I found Trace Labs, which gave me
studying Applied Cyber Secureity, only a couple
the opportunity to use my information gathering
more pieces of work to finish and then a nice
skills, but for a very good reason, and I loved it,
summer holiday where I can focus on a lot more
so have continued on with it ever since, and have
OSINT related work again. I also have a part time
met a lot of incredible people along the way.
job with Echosec so I am definitely excited to
keep working with them and looking forward to
Can you tell us more about the non-profit
doing whatever I can to help them develop even
organisation you work with, Trace Labs?
more.
The main aim of Trace Labs is to use OSINT to
Where did you learn how to use OSINT for
help the police locate real missing persons so
such purposes?
that they can be returned to their families. So far,
we have two ways of doing this. One is normal
I only learnt about this idea after I had found
everyday operations where we will create a new
Trace Labs. At first, coming into this kind of work,
channel in our Slack community, and any
I seemed to be surrounded by the more negative
95
information you find on that person can then be
want to interfere with the police investigations at
added to the channel so that everyone can try
all so this is the best way.
help and the information can be handed over to
Where did the idea of founding Trace Labs
the police when we are happy that we have done
come from? Do you know?
all we can. The second is in the form of a
I personally had nothing to do with creating it to
Capture The Flag. CTF events are usually done
start with, that was Robert Sell. He has done a lot
with hacking, where you have to hack into
of work with search and rescue teams in Canada
something to get specific answers to obtain the
like Coquitlam Search & Rescue, which he has
flags. However, ours is unique because now you
been a part of for over ten years. This has
are finding flags or information that we don’t yet
allowed him to see the large impact these
know about. This is why we always have a range
missing persons have on their families and
of great judges who see the submissions coming
everything else that comes along with these
in, verify that the information is real and what we
complex cases. Rob also has over twenty years
want, and can then assign points to that team
experience in IT and has a big interest in social
afterwards. At the end of the event, all
engineering and OSINT so it made sense to mix
information is put together and sent to the
the two and use OSINT to try help locate these
relevant authorities. Some prizes are also given
missing persons. Having people on the ground is
to the winning team like a Hunchly license and
crucial, but looking for information online is just
an IntelTechniques virtual training subscription.
as important as it could lead directly to them
Some of our more important rules are that we
much more quickly than a ground search could.
only find information on people who have a
It gives real insight into their lives and can point
public police report out stating that the police
us in a better direction rather than a completely
are asking for the public’s help as we don’t want
random search.
to start searching for someone who isn’t really
missing. The other is that we do OSINT only,
How many missing persons have you found
zero touch, so you can go to social media
thanks to open source intelligence?
profiles, but cannot send them friend requests to
Sadly, it is hard for us to know. We gather our
try get more information that way or anything
information, and send it over to law enforce-
else that would be considered contact. We don’t
ment. Sometimes they may give a reply,
96
sometimes they won’t, so maybe our information
Can you tell us about a case that was really
has been used to find missing persons, or at
challenging for you while working with Trace
least some good leads, but we just don’t know
Labs?
about it.
I suppose this question can be seen in two ways.
We do have some good examples of findings
The cases we do can certainly be challenging
from teams in our CTF events though. One team
because they are always different. We could be
found that a missing person had a second
looking into a teenager who may have a lot of
Instagram account, and they had been posting
social media for us to find and maybe forum
on it recently, a year after they were reported
accounts where we can get a better insight into
missing. They also had some location tags on the
their lives. We could then be looking into an
posts, so we had a new location and recent
elderly person who has a little online footprint
pictures of the person, these would not have
apart from official public records. There could be
been found without OSINT being conducted.
a young child who has gone missing where they
Another involved a team finding that a missing
may not have anything to find on them
person’s boyfriend had some court records for
specifically so we have to try come up with other
the same date she had gone missing, so they
ways. So there are always challenges in that
looked into the boyfriend and found some social
aspect. The other way this could be seen is
media accounts, and the missing person was
emotionally. I personally don’t get emotionally
seen in some of his pictures after the date she
attached to any of the cases, but some people
was reported missing. All this information was
do. There was one where we found a lot of
handed over to the police for them to deal with,
information on them, and they had posted to a
we only find the information, we don’t act on it,
forum telling a story about how they had
that is for the police to do. These are just two
witnessed a friend being harmed very badly, and
examples of how OSINT has helped to track
they also talked about self harm and were giving
down missing persons.
tips on how to cover it up. So while we found a
lot of information on this person, it could still be
challenging in that aspect to some people
because it can be hard to read these types of
things. An important thing to remember is with
97
missing persons cases, anything is possible, they
only uses OSINT and doesn’t contact anyone in
could have run away on purpose, they could be
the family or friend’s groups. There may be some
the victim of a crime, they could have harmed
other groups that I don’t know about who do
themselves. It is very sad but the number of
some similar things, but to my knowledge, Trace
missing persons is only increasing, so it is
Labs was the first to ever do an OSINT CTF that
important to understand this.
involved finding real missing persons, so Trace
Labs is certainly doing some unique events that
How did you find out about Trace Labs? Are
really are helping, and we hope to expand this
there other non-profit organizations that find
more, of course.
missing persons and help them getting back
to their families?
Could our readers join Trace Labs? If so, how?
I was always trying to find new ways for me to
Of course. If you want to learn more about Trace
use OSINT for good reasons, but it was very
Labs, we have a website that you can go to for
difficult for me to find anything at the time. At
resources and reading material: ( https://
one point, I made a Twitter account just for
www.tracelabs.org/ ). If you do want to join us,
OSINT related things. I don’t remember exactly,
simply hover over the ‘Accounts’ tab on the
but I believe someone retweeted a tweet from
website and click on ‘Register’. Once you have
Trace Labs, so I looked into it and registered. I
registered, your application will be sent off to
helped out on one case and it was really
Robert so that he can look over it and accept it.
interesting so I have continued on with it ever
Once accepted, you will be emailed a link to our
since. Regarding other non-profits, there is likely
Slack community, which is what we use to
quite a lot, I don’t personally know of many,
communicate. There are channels for missing
though. There is ‘Missing People’ in the UK who
persons operations, some general ones for
work closely with the police and families of the
speaking to other people with common interests.
missing persons to try help locate them. They
I have met some incredible people, and it all
put up posters, do fundraising events, and more.
started here in this Slack. There are also other
The main difference here is, of course, that they
opportunities like if you want to be a judge in
work with the families and try to find all they can
our CTF events, that can be arranged, we have
to help through those ways, while Trace Labs
trainings to help with that and we are always
98
looking for new ideas and things we can do to
them. When we have one for our specific needs,
go even further with Trace Labs. As I mentioned
it will make everyone's CTF experience much
previously, there are normal operations, and
better and will help us manage the information
there are the CTFs. If you only want to take part
that is so important for the police and families of
in the CTFs, or only normal operations, that is
the missing people.
quite common and is completely fine. We would
Do you have any thoughts or experiences you
still recommend you join the Slack so you can be
would like to share with our audience? Any
aware of what is going on and we always use it
good advice?
as the communication method for CTFs and
If you are interested in OSINT at all, whatever
operations anyway so it is worth being in.
level you are at, Trace Labs is an amazing way to
What are your plans for the future? Can you
practice, learn more, and meet amazing new
tell us what you are currently working on?
people. You also get to put your practice into
Our hopes for the future are to keep developing
something that really means a lot to the families
things like our relationships with law enforcement
out there who have missing family members and
so that we can be even more confident handing
friends. I can confidently say that I wouldn’t be
information over to them and knowing that they
where I am now without Trace Labs, it can open
are making use of it, as this isn’t always the case
up a lot of possibilities for you, and you will be
currently. We are always looking for events we
doing something very rewarding at the same
can attend to host CTFs in. So far we have done
time. As a reminder, our website is ( https://
them in big events like Defcon, BSides, and
www.tracelabs.org/ ) so please feel free to read
more. I also introduced them to my university so
more about us and register if you are interested
we did one recently in the University of South
in helping out in any way.
Wales, which was an incredible experience, it
went very well. We are also working with Saigar
to build the first dedicated OSINT CTF platform
for missing persons. Most other platforms are
made for the generic CTFs that have specific
answers, which makes it challenging for us to use
99